Question 36

A cybersecurity engineer analyst a system for vulnerabilities. The tool created an OVAL. Results document as output. Which of the following would enable the engineer to interpret the results in a human readable form? (Select TWO.)
  • Question 37

    A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown system is not consistent with best practices in the security field and leaves the institution vulnerable.
    Which of the following should the security team recommend FIRST?
  • Question 38

    After a security incident, a network security engineer discovers that a portion of the company's sensitive external traffic has been redirected through a secondary ISP that is not normally used.
    Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?
  • Question 39

    A company suspects a web server may have been infiltrated by a rival corporation. The security engineer reviews the web server logs and finds the following:

    The security engineer looks at the code with a developer, and they determine the log entry is created when the following line is run:

    Which of the following is an appropriate security control the company should implement?
  • Question 40

    Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?