A. Review a recent gap analysis.
A. Monitor camera footage corresponding to a valid access request.
A. Inform users regarding what data is stored.
C. Provide data deletion capabilities.
B. A certificate on the WAF is expired.
D. Key escrow
D. OTP and 802.1X
A. NIDS
D. Update security awareness training to address new threats, such as best practices for data security.
The security engineer looks at the UTM firewall rules and finds the following:
Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network?
A. Contact the email service provider and ask if the company IP is blocked.
B. Confirm the email server certificate is installed on the corporate computers.
C. Make sure the UTM certificate is imported on the corporate computers.
D. Create an IMAPS firewall rule to ensure email is allowed.
B. Confirm the email server certificate is installed on the corporate computers
B. sudo netstat -nlt -p | grep “ESTABLISHED”
C. Restricting external port 22 access
A. Investigating a potential threat identified in logs related to the identity management system
Which of the following is the MOST likely cause of the customer’s inability to connect?
A. Weak ciphers are being used.
B. The public key should be using ECDSA.
C. The default should be on port 80.
D. The server name should be test.com.
B. The public key should be using ECDSA.
A. A vulnerability
A. Create a full inventory of information and data assets.
Only users with corporate-owned devices can directly access servers hosted by the cloud provider. The company can control what SaaS applications each individual user can access.
User browser activity can be monitored.
Which of the following solutions would BEST meet these requirements?
A. IAM gateway, MDM, and reverse proxy
B. VPN, CASB, and secure web gateway
C. SSL tunnel, DLP, and host-based firewall
D. API gateway, UTM, and forward proxy
A. IAM gateway, MDM, and reverse proxy
A. Spawn a shell using sudo and an escape string such as sudo vim -c ‘!sh’.
D. Key vault
C. Remotely wipe the device.
A. Disable BGP and implement a single static route for each internal network.