Question 56

The Chief information Security Officer (CISO) of a small locate bank has a compliance requirement that a third-party penetration test of the core banking application must be conducted annually. Which of the following services would fulfill the compliance requirement with the LOWEST resource usage?
  • Question 57

    A small business requires a low-cost approach to theft detection for the audio recordings it produces and sells.
    Which of the following techniques will MOST likely meet the business's needs?
  • Question 58

    A recent data breach stemmed from unauthorized access to an employee's company account with a cloud-based productivity suite. The attacker exploited excessive permissions granted to a third-party OAuth application to collect sensitive information.
    Which of the following BEST mitigates inappropriate access and permissions issues?
  • Question 59

    An analyst execute a vulnerability scan against an internet-facing DNS server and receives the following report:

    Which of the following tools should the analyst use FIRST to validate the most critical vulnerability?
  • Question 60

    A company's SOC has received threat intelligence about an active campaign utilizing a specific vulnerability. The company would like to determine whether it is vulnerable to this active campaign.
    Which of the following should the company use to make this determination?