Question 26

Refer to the exhibit.

An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?
  • Question 27

    A company recently started accepting credit card payments in their local warehouses and is undergoing a PCI audit. Based on business requirements, the company needs to store sensitive authentication data for 45 days. How must data be stored for compliance?
  • Question 28

    A SOC team receives multiple alerts by a rule that detects requests to malicious URLs and informs the incident response team to block the malicious URLs requested on the firewall. Which action will improve the effectiveness of the process?
  • Question 29

    Drag and drop the cloud computing service descriptions from the left onto the cloud service categories on the right.

    Question 30

    Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right.