Question.56 An executive has decided to move a company’s customer-facing application to the cloud after experiencing a lengthy power outage at a locally managed service provider’s data center. The executive would like a solution that can be implemented as soon as possible. Which of the following will BEST prevent similar issues when the service is running in the cloud? (Choose two.) (A) Placing the application instances in different availability zones (B) Restoring the snapshot and starting the new application instance from a different zone (C) Enabling autoscaling based on application instance usage (D) Having several application instances running in different VPCs (E) Using the combination of block storage and multiple CDNs in each application instance (F) Setting up application instances in multiple regions |
56. Click here to View Answer
Answer: AF
Question.57 A security team is concerned with attacks that are taking advantage of return-oriented programming against the company’s public facing applications. Which of the following should the company implement on the public-facing servers? (A) WAF (B) ASLR (C) NX (D) HSM |
57.Click here to View Answer
Answer: A
Question.58 A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer’s laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy. Which of the following solutions should the security architect recommend? (A) Replace the current antivirus with an EDR solution. (B) Remove the web proxy and install a UTM appliance. (C) Implement a deny list feature on the endpoints. (D) Add a firewall module on the current antivirus solution. |
58. Click here to View Answer
Answer: A
Question.59 A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt that data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data? (A) Key rotation (B) Key revocation (C) Key escrow (D) Zeroization (E) Cryptographic obfuscation |
59. Click here to View Answer
Answer: B
Question.60 A network administrator for a completely air-gapped and closed system has noticed that anomalous external files have been uploaded to one of the critical servers. The administrator has reviewed logs in the SIEM that were collected from security appliances, network infrastructure devices, and endpoints. Which of the following processes, if executed, would be MOST likely to expose an attacker? (A) Reviewing video from IP cameras within the facility (B) Reconfiguring the SIEM connectors to collect data from the perimeter network hosts (C) Implementing integrity checks on endpoint computing devices (D) Looking for privileged credential reuse on the network |
60. Click here to View Answer
Answer: D