Question.31 A security architect is given the following requirements to secure a rapidly changing enterprise with an increasingly distributed and remote workforce: Cloud-delivered services Full network security stack SaaS application security management Minimal latency for an optimal user experience Integration with the cloud IAM platform Which of the following is the BEST solution? (A) Routing and Remote Access Service (RRAS) (B) NGFW (C) Managed Security Service Provider (MSSP) (D) SASE |
31. Click here to View Answer
Answer: C
Question.32 A company has hired a third party to develop software as part of its strategy to be quicker to market. The company’s policy outlines the following requirements: The credentials used to publish production software to the container registry should be stored in a secure location. Access should be restricted to the pipeline service account, without the ability for the third-party developer to read the credentials directly. Which of the following would be the BEST recommendation for storing and monitoring access to these shared credentials? (A) TPM (B) Local secure password file (C) MFA (D) Key vault |
32. Click here to View Answer
Answer: D
Question.33 A security analyst discovered that the company’s WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests: (&(objectClass=*)(objectClass=*))(&(objectClass=void)(type=admin)) Which of the following would BEST mitigate this vulnerability? (A) Network intrusion prevention (B) Data encoding (C) Input validation (D) CAPTCHA |
33. Click here to view Answer
Answer: C
Question.34 A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively? (A) Join an information-sharing community that is relevant to the company. (B) Leverage the MITRE ATT&CK framework to map the TTP. (C) Use OSINT techniques to evaluate and analyze the threats. (D) Update security awareness training to address new threats, such as best practices for data security. |
34. Click here to View Answer
Answer: B
Question.35 A security engineer is implementing a server-side TLS configuration that provides forward secrecy and authenticated encryption with associated data. Which of the following algorithms, when combined into a cipher suite, will meet these requirements? (Choose three.) (A) EDE (B) CBC (C) GCM (D) AES (E) RSA (F) RC4 (G) ECDSA (H) DH |
35. Click here to View Answer
Answer: CDH