Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONDayoSet1

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
DayoSet1

Description:
DayoSet1

Author:
AVATAR

Creation Date:
02/03/2024

Category:
Others

Number of questions: 20
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for missionessential item. Which of the following phases establishes the identification and prioritization of critical system and function Review a recent gap analysis Perform a cost-benefit analysis Conduct a business impact analysis Develop an exposure factor matrix.
An organization is preparing to migrate its production environment system from an on-premise environment to a cloud service. The lead security architect is concerned that the organization current method for addressing risk may not be possible in the cloud environment. Which of the following BEST describes the reason why traditional methods of addressing risk may not be possible in the cloud Migrating operation assumes the acceptance of all risk. Cloud providers are unable to avoid risk. Specific risks cannot be transferred to the cloud provider. Risks to data in the cloud cannot be mitigated.
A company created an external application for its customer. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose 2) Conduct input sanitization Deploy a SIEM. Use containers Patch the OS Deploy a WAF. Deploy a reverse proxy Deploy an IDS.
In preparation for the holiday season, a company redesigned the system that manages retail sales and moved it to a cloud service provider. The new infrastructure did not meet the company's availability requirements. During a postmortem analysis, the following issue were highlighted: 1. International users reported latency when images on the web page were initially loading. 2. During times of report processing, users reported issues with inventory when attempting to place order. 3. Despite the fact that ten new API servers were added, the load across servers was heavy at peak times. Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future Serve static content via distributed CDNs, create a read replica of the central database and pull reports from there, and auto-scale APIservers based on performance. Increase the bandwidth for the server that delivers images, use a CDN, change the database to a non-relational database, and split the ten API servers across two load balancers. Serve images from an object storage bucket with infrequent read times, replicate the database across different regions, and dynamically create API servers based on load. Serve static-content object storage across different regions, increase the instance size on the managed relational database, and distribute the ten API servers across multiple regions.
During a remodel, a company computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room.The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.Which of the following processes would BEST satisfy this requirement Monitor camera footage corresponding to a valid access request. Require both security and management to open the door Require department managers to review denied-access requests Issue new entry badges on a weekly basis.
A company is preparing to deploy a global service. Which of the following must the company do to ensure GDPR compliance? (Choose 2) Inform users regarding what data is stored. Provide opt-in/out for marketing messages. Provide data deletion capabilities. Provide optional data encryption. Grant data access to third parties. Provide alternative authentication techniques.
A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determine specific traffic is not being logged, and there is no visibility from the WAF for the web application. Which of the following is the MOST likely cause? The user agent client is not compatible with the WAF A certificate on the WAF is expired. HTTP traffic is not forwarding to HTTPS to decrypt. Old vulnerable cipher suites are still being used.
A security analyst is reviewing the following output. Which of the following would BEST mitigate this type of attack Installing a network firewall Placing a WAF inline Implementing an IDS Deploying a honeypot.
Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity Key sharing Key distribution Key recovery Key escrow.
An organization is implementing a new identity and access management architecture with the following objectives ✑ Supporting MFA against on-premises infrastructure ✑ Improving the user experience by integrating with SaaS applications ✑ Applying risk-based policies based on location ✑ Performing just-in-time provisioning Which of the following authentication protocols should the organization implement to support these requirement Kerberos and TACACS SAML and RADIUS OAuth and OpenID OTP and 802.1X.
Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext Lattice-based cryptography Quantum computing Asymmetric cryptography Homomorphic encryption.
A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company's services to ensure false positives do not drop legitimate traffic. Which of the following would satisfy the requirement NIDS NIPS WAF Reverse proxy.
A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services. Which of the following should be modified to prevent the issue from reoccurring Recovery point objective Recovery time objective Mission-essential functions Recovery service level.
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites. The technician will define this threat as a decrypting RSA using obsolete and weakened encryption attack. a zero-day attack. an advanced persistent threat. an on-path attack.
A security engineer thinks the development team has been hard-coding sensitive environment variables in its code. Which of the following would BEST secure the company's CI/CD pipeline Utilizing a trusted secrets manager Performing DAST on a weekly basis Introducing the use of container orchestration Deploying instance tagging.
A small company recently developed prototype technology for a military program. The company's security engineer is concerned about potential theft of the newly developed, proprietary information.Which of the following should the security engineer do to BEST manage the threats proactively Join an information-sharing community that is relevant to the company. Leverage the MITRE ATT&CK framework to map the TTP. Use OSINT techniques to evaluate and analyze the threats. Update security awareness training to address new threats, such as best practices for data security.
A security engineer has been asked to close all non-secure connections from the corporate network. The engineer is attempting to understand why the corporate UTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users are able to download emails correctly by using IMAP instead. The network comprises three VLAN -Vlan 30 Guest Network 192.168.20.0/25 -Vlan 20 Corporate user network 192.168.0.0/28 -Vlan110 Corporate server network 192.168.0.16/29 The security engineer looks at the UTM firewall rules and finds the following Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network Contact the email service provider and ask if the company IP is blocked. Confirm the email server certificate is installed on the corporate computers. Make sure the UTM certificate is imported on the corporate computers. Create an IMAPS firewall rule to ensure email is allowed.
A security analyst is reviewing network connectivity on a Linux workstation and examining the active TCP connections using the command line.Which of the following commands would be the BEST to run to view only active Internet connections sudo netstat -antu | grep ג€LISTEN ג€ | awk '{print$5}' sudo netstat -nlt -p | grep ג€ESTABLISHED sudo netstat -plntu | grep -v ג€Foreign Address sudo netstat -pnut -w | column -t -s $'\w' sudo netstat -pnut | grep -P ^tcp.
A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking. After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run Protecting Permissive Enforcing Mandatory.
A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log. Which of the following actions would BEST address the potential risks posed by the activity in the logs? Altering the misconfigured service account password Modifying the AllowUsers configuration directive Restricting external port 22 access Implementing host-key preferences.
Report abuse Consent Terms of use