A company is concerned about the potential risks associated with unauthorized modifications to the basic input/output system (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which technique will prevent unauthorized modifications to the BIOS firmware on a server?
The DevSecOps team for an organization manages a continuous integration and continuous deployment (CI/CD) pipeline for a three-tier web application. Management has asked the team toperform a series of comprehensive post-deployment tests to make sure that all of the components of the application can interact and function properly.
What should the team recommend?
An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.
Which protocol meets the needs of the organization?
The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.
Which type of file should the analyst use to inspect the traffic?
A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient healthinformation. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.
Which protocol will meet the needs of this provider?
The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.
Which solution fulfills these requirements?
Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?
A software company is reviewing its disaster recovery plan and wants to identify the criticality of its business processes to prioritize its recovery efforts.
Which will determine the criticality of its business processes?
A healthcare organization is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which regulates the privacy and security of personal health information. The organization uses simple network management protocol (SNMP) to manage and monitor its network devices.
Which security control will protect the confidentiality of network device information within this organization?
A security analyst for a financial institution is in the process of planning to upgrade the institution’s IT infrastructure to meet current industry standards. There are various potential risks associated with the upgrade, including data breaches, system outages, and cost overruns. The analyst is tasked with managing these risks to ensure a successful upgrade.
What is the first step in the risk management life cycle in this scenario?
A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities, including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.
Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?
Which IT role is responsible for installing new hardware and troubleshooting existing hardware?
An organization needs to securely exchange confidential documents with a third-party vendor overan unsecured network connection. The organization wants to ensure that the documents can only be read by the intended recipient and cannot be intercepted or read by unauthorized parties.
Which type of encryption meets the needs of the organization?
When is it better to purchase software rather than build a software solution in-house?
What type of a system requirement involves preventing unauthorized access to data?
A company has recently experienced a data breach from an insider threat and wants to implement a policy to reduce the risk of similar incidents in the future. During the incident, the insider threat accessed sensitive information stored in the administrator account from their user account. The insider threat was not in a supervisory role at the time of the incident.
Which policy should the company implement?
In which type of network topology are the networked devices connected to a central device like a hub or switch?
Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?
A healthcare organization would like to work with another healthcare organization without needing to maintain identified accounts for members of the other organization.
Which technology concept should the company use?
A company is concerned about advanced persistent threats and wants to implement a security solution that can detect any unusual actions. The company wants to analyze the actions and trends of users and entities to identify any potential security risks.
Which security technology meets the needs of the company?
A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.
What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?
An application team manages a large farm of web servers on virtual machines in the cloud. The team wants to reduce the server load by caching static content. Adding a second layer of protection is also a requirement.
What should this team recommend in this scenario?
Which two benefits do computer networks provide for businesses?
Choose 2 answers
Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?
A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.
Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?
A company is developing a new mobile application to support external customers and contractors. The application needs to allow users to sign in using third-party social identities.
What is the best protocol?
How should a security analyst detect a potential structured query language (SQL) injection attack?
What are two differences between a handheld computer and a desktop?
Choose 2 answers.
A company wants to secure its computer systems and prevent any unauthorized access to its network. The company wants to implement a security solution that can restrict network traffic to only approved services and applications.
Which security technology will meet the needs of this company?
An IT organization has recently migrated its servers to the cloud. The security team needs to delegate administrative control of multiple cloud services to various administrators inside the company. This team needs a granular solution that will offer the most flexibility while maintaining a secure posture.
What is the best solution?
An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services.
Which protocol will offer the most reliable and secure method for data transport?
A small online retailer stores customer information, product inventory, and financial data on its local servers.
What are the necessary components of a business continuity and disaster recovery plan for this company?
A security team has been informed that user data on the network has been compromised.
What is the first step the organization should take to respond to this data breach?
A government agency needs to deploy a secure network connection between its offices in Chicago and New York.
What should be used to facilitate this connection?
A professional services organization deployed security edge devices in key locations on its corporate network.
How will these devices improve the organization's security posture?
A medium-sized grocery chain with locations all across the United States has a new business requirement that all devices must authenticate to access its resources.
What should the grocery chain use for the devices to authenticate?
Why should an information technology (IT) professional be aware of professional associations?