An application team manages a large farm of web servers on virtual machines in the cloud. The team wants to reduce the server load by caching static content. Adding a second layer of protection is also a requirement.
What should this team recommend in this scenario?
What is a function of a compiler?
A company is concerned about the security of its users’ passwords and is looking for a solution to ensure that user credentials are kept safe.
What is the best solution?
What is a component of IT infrastructure?
A company is developing a new mobile application to support external customers and contractors. The application needs to allow users to sign in using third-party social identities.
What is the best protocol?
A company's website is suddenly redirecting users to a suspicious landing page asking for personal information.
What is the most likely cause of the issue?
What is one purpose of an End User License Agreement?
A financial services company is concerned about the potential risks associated with sensitive customer data stored on employee laptops. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which hardening technique will meet the needs of this company?
What is the vocabulary and set of rules for instructing a computer to perform certain tasks?
An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services.
Which protocol will offer the most reliable and secure method for data transport?
The security team has been tasked with selecting a password complexity policy for the organization.
Which password complexity policy option should be recommended?
A retail company has recently implemented a new point of sale (POS) system that is critical to its business.
Which security control is essential for protecting the availability of the POS system?
What is a common characteristic of a proprietary software license?
An organization wants to ensure that its website is free of certain vulnerabilities before the final hand-off to the client.
What testing method should the organization use to inspect traffic to detect potential issues?
A cybersecurity analyst at a healthcare organization was tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the enterprise. Theanalyst notices unknown users logging on to the company's wireless local-area network (WLAN).
What is a potential vulnerability the healthcare organization is facing based on the IOCs identified?
What type of software utilizes a commercial software license?
A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.
Which solution meets the requirements in this scenario?
Which risk management strategy will secure an application from potential malware and advanced persistent threats?
A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.
Which logging mechanism will create an audit trail?
A company with a hybrid cloud deployment needs to identify all possible threat types that could impact production systems.
Which threat hunting technique should be used to identify potential attacks that have already occurred?
A healthcare organization would like to work with another healthcare organization without needing to maintain identified accounts for members of the other organization.
Which technology concept should the company use?
A company wants to ensure that the integrity of its systems is maintained during the startup process.
Which security technology can ensure the integrity of the system during startup by verifying that the system has not been compromised?
An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property.
Which threat actor is most likely in this scenario?
A government agency is planning a hybrid cloud deployment. Strict controls must be in place that can label classified data. The solution must ensure that access rights will be granted based on the user's government security classification.
Which type of access control should be used?
Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?
In which generation were computers first built with transistors?
How can the organizational culture support ethical guidelines?
A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.
Which step of the risk management life cycle involves implementing security controls to prevent the risk?
What is scope creep?
Which motherboard component is used for short-term storage of data?
A large technology company has discovered a known vulnerability in its network infrastructure. The infrastructure contains a number of retired assets that are no longer receiving security updates, which can potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which hardening technique will meet the needs of this company?
Which life cycle is part of the process for planning, creating, testing, and deploying information systems?
When is it better to purchase software rather than build a software solution in-house?
A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.
Which security measure will meet the needs of this company?
An IT team has been tasked with improving an organization's security posture to defend against potential malicious actors.
What is the first step when hunting for potential threats?
A healthcare organization has experienced a ransomware attack that has resulted in the encryption of all patient medical records. The organization has backups, but restoring the data will take severaldays, and during that time, patient care will be significantly diminished.
What is the most important factor to consider when evaluating the severity of the ransomware attack?
What is true about an operating system?
Which characteristic applies to machine-level languages?
A consultancy organization has many employees who travel with different mobile devices. Having the employees visit an office to update their devices is not feasible due to their travel schedule.
How should the organization ensure that its employees receive the latest security updates?
An organization wants to implement a new encryption solution to protect sensitive data stored in a database. The organization wants to ensure that the encryption solution provides strong protection for the data and is willing to sacrifice performance.
Which type of encryption meets the needs of the organization?
During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.
Which action should be taken to resolve the issue?
Which system conversion method deploys the new system while the old system is still operational in order to compare output?
Which block cipher mode of operation for encrypting data is simple and efficient and provides no confidentiality beyond that of the underlying block cipher?
Which characteristic identifies intranet application software?
Which item information should be stored in a database to determine an order total?
A security team has been informed that user data on the network has been compromised.
What is the first step the organization should take to respond to this data breach?
In which type of network topology are the networked devices connected to a central device like a hub or switch?
Which task is the responsibility of a database administrator?
A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server.
Which strategy should be used to prevent an attacker from gaining unauthorized information?
How are IT and globalization related?
What is the correct order of project phases?
The development team has requested permission to use several open-source libraries to build a corporate web application.
Which resource can the security team recommend to ensure these libraries can be trusted?
In which state is data considered information?
A large corporation is considering expanding its operations into a new geographic region. The corporation is concerned about the potential dangers associated with this expansion.
What is the most important factor to consider when evaluating the potential risks in this scenario?
While undergoing a security audit, it is determined that an organization has several backup repositories hosted in the cloud without any level of protection.
Which action should be taken to protect the backup repositories first?
Management has asked its networking team to recommend a solution for direct communication between multiple virtual networks in the cloud. The solution must utilize the least amount of administrative effort.
Which solution meets the requirements?
An organization's board of directors is reviewing the risk register and attempting to evaluate whether there is too much risk for the organization.
Which metric should the board review?
Which key exchange algorithm is based on advanced cryptography algorithms and is a more efficient alternative to traditional key exchange algorithms?