Question 41

A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company's services to ensure false positives do not drop legitimate traffic.
Which of the following would satisfy the requirement?
  • Question 42

    Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?
  • Question 43

    An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.
    Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
  • Question 44

    A network architect is designing a new SD-WAN architecture to connect all local sites to a central hub site. The hub is then responsible for redirecting traffic to public cloud and datacenter applications. The SD-WAN routers are managed through a SaaS, and the same security policy is applied to staff whether working in the office or at a remote location. The main requirements are the following:
    1. The network supports core applications that have 99.99% uptime.
    2. Configuration updates to the SD-WAN routers can only be initiated from the management service.
    3. Documents downloaded from websites must be scanned for malware.
    Which of the following solutions should the network architect implement to meet the requirements?
  • Question 45

    A networking team was asked to provide secure remote access to all company employees. The team decided to use client-to-site VPN as a solution. During a discussion, the Chief Information Security Officer raised a security concern and asked the networking team to route the Internet traffic of remote users through the main office infrastructure. Doing this would prevent remote users from accessing the Internet through their local networks while connected to the VPN.
    Which of the following solutions does this describe?