Question 1 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Which of the following should the analyst utilize to best accomplish this goal? A. SMB share B. API endpoint C. SMTP notification D. SNMP trap Submit Answer
Question 2 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following is the best technical method to protect sensitive data at an organizational level? A. Deny all traffic on port 8080 with sensitive information on the VLAN. B. Develop a Python script to review email traffic for PII. C. Employ a restrictive policy for the use and distribution of sensitive information. D. Implement a DLP for all egress and ingress of sensitive information on the network. Submit Answer
Question 3 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A cybersecurity analyst is reviewing static application security testing scan results and notices a finding for hard-coded credentials. Which of the following should the analyst recommend to the application team to resolve this concern? A. Implement a privileged access management solution. B. Enable single sign-on. C. Obfuscate application programming interface keys. D. Integrate secrets management. Submit Answer
Question 4 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A security analyst is implementing a vulnerability scanning tool with new methodologies and processes. After tuning and rescanning, a large number of vulnerabilities still exist. The team verifies that the findings do not contain any false positives. Which of the following will best help with prioritization? A. Provide a list of the top ten vulnerabilities. B. Implement a bug bounty program. C. Determine which security gaps are exploitable. D. Perform a penetration test. Submit Answer
Question 5 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A security analyst received an alert regarding multiple successful MFA log-ins for a particular user. When reviewing the authentication logs, the analyst sees the following table of logins. Which of the following are most likely occurring, based on the MFA logs? (Select two) A. Dictionary attack B. Push phishing C. Impossible geo-velocity D. Subscriber identity module swapping E. Rogue access point F. Password spray Submit Answer