Maintain compliance with company and regulatory guidelines
Detect and respond to insider threats, privileged user threats, and compromised accounts Enforce datacentric security, such as encryption, tokenization, and access control
Which of the following solutions should the security engineer recommend to address these requirements?
A. WAF
B. CASB
C. SWG
D. DLP
C. SWG
A. 0.5
AVEF = SLE SLEARO = ALE
ARO – twice every 4 yrs or 2/4 on an annual basis = 0.5
B. Implement PAM, remove users from the local administrators group, and prompt users for explicit approval when elevated privileges are required.
D. Purchasing and installing a DRM suite
A. Implement rate limiting on the API.
Unstructured data being exfiltrated after an employee leaves the organization Data being exfiltrated as a result of compromised credentials
Sensitive information in emails being exfiltrated
Which of the following solutions should the security team implement to mitigate the risk of data loss?
A. Mobile device management, remote wipe, and data loss detection
B. Conditional access, DoH, and full disk encryption
C. Mobile application management, MFA, and DRM
D. Certificates, DLP, and geofencing
A. Mobile device management, remote wipe, and data loss detection
B. Local caching
A. The client can seamlessly move data.
B. The vendor can change product offerings.
C. The client receives a sufficient level of service.
D. The client experiences decreased quality of service.
E. The client can leverage a multicloud approach.
F. The client experiences increased interoperability
B. The vendor can change product offerings.
D. The client experiences decreased quality of service.
B. ASLR
B. Cgroups
A. Instance-based
C. Enforcing protocol conformance for messages
B. DRM
DRM (Digital Rights Management) allows us to control what may be done with information even after it has left out network.
A. Designing data protection schemes to mitigate the risk of loss due to multitenancy
C. Increase the frequency of backups and create SIEM alerts for IOCs.
D. An active-active solution within the same tenant
B. Remove the web proxy and install a UTM appliance.
C. Implement a deny list feature on the endpoints.
D. Add a firewall module on the current antivirus solution.
A. Replace the current antivirus with an EDR solution.
A. Data loss detection, reverse proxy, EDR, and PGP
C. Monitor dependency management tools and report on susceptible third-party libraries.
D. Install an IDS on the development subnet and passively monitor for vulnerable services.
C. Microsegmentation enabled by software-defined networking