Question 356

A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?
  • Question 357

    A new security policy states all wireless and wired authentication must include the use of certificates when connecting to internal resources within the enterprise LAN by all employees.
    Which of the following should be configured to comply with the new security policy? (Choose two.)
  • Question 358

    An attacker wants to gain information about a company's database structure by probing the database listener.
    The attacker tries to manipulate the company's database to see if it has any vulnerabilities that can be exploited to help carry out an attack. To prevent this type of attack, which of the following should the company do to secure its database?
  • Question 359

    An organization is currently working with a client to migrate data between a legacy ERP system and a cloud-based ERP tool using a global PaaS provider. As part of the engagement, the organization is performing data deduplication and sanitization of client data to ensure compliance with regulatory requirements. Which of the following is the MOST likely reason for the need to sanitize the client data?
  • Question 360

    Joe, a penetration tester, is assessing the security of an application binary provided to him by his client.
    Which of the following methods would be the MOST effective in reaching this objective?