Question.71 A company is looking at sending historical backups containing customer PII to a cloud service provider to save on storage costs. Which of the following is the MOST important consideration before making this decision? (A) Availability (B) Data sovereignty (C) Geography (D) Vendor lock-in |
71. Click here to View Answer
Answer: B
Question.72 A new mandate by the corporate security team requires that all endpoints must meet a security baseline before accessing the corporate network. All servers and desktop computers are scanned by the dedicated internal scanner appliance installed in each subnet. However, remote worker laptops do not access the network regularly. Which of the following is the BEST option for the security team to ensure remote worker laptops are scanned before being granted access to the corporate network? (A) Implement network access control to perform host validation of installed patches. (B) Create an 802.1X implementation with certificate-based device identification. (C) Create a vulnerability scanning subnet for remote workers to connect to on the network at headquarters. (D) Install a vulnerability scanning agent on each remote laptop to submit scan data. |
72. Click here to View Answer
Answer: D
Question.73 While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware. Which of the following is the NEXT step the analyst should take after reporting the incident to the management team? (A) Pay the ransom within 48 hours. (B) Isolate the servers to prevent the spread. (C) Notify law enforcement. (D) Request that the affected servers be restored immediately. |
73. Click here to View Answer
Answer: B
Question.74 A software house is developing a new application. The application has the following requirements: Reduce the number of credential requests as much as possible Integrate with social networks Authenticate users Which of the following is the BEST federation method to use for the application? (A) WS-Federation (B) OpenID (C) OAuth (D) SAML |
74. Click here to View Answer
Answer: D
Question.75 A security engineer notices the company website allows users to select which country they reside in, such as the following example: https://mycompany.com/main.php?Country=US Which of the following vulnerabilities would MOST likely affect this site? (A) SQL injection (B) Remote file inclusion (C) Directory traversal (D) Unsecure references |
75. Click here to View Answer
Answer: B