Loading...

A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Which of the following should the analyst utilize to best accomplish this goal?

Which of the following is the best technical method to protect sensitive data at an organizational level?

A cybersecurity analyst is reviewing static application security testing scan results and notices a finding for hard-coded credentials. Which of the following should the analyst recommend to the application team to resolve this concern?

A security analyst is implementing a vulnerability scanning tool with new methodologies and processes. After tuning and rescanning, a large number of vulnerabilities still exist. The team verifies that the findings do not contain any false positives. Which of the following will best help with prioritization?

A security analyst received an alert regarding multiple successful MFA log-ins for a particular user. When reviewing the authentication logs, the analyst sees the following table of logins. Which of the following are most likely occurring, based on the MFA logs? (Select two)