Question 71

A security engineer needs to recommend a solution that will meet the following requirements:
Identify sensitive data in the provider's network
Maintain compliance with company and regulatory guidelines
Detect and respond to insider threats, privileged user threats, and compromised accounts Enforce datacentric security, such as encryption, tokenization, and access control Which of the following solutions should the security engineer recommend to address these requirements?
  • Question 72

    A company's Chief Information Security Officer is concerned that the company's proposed move to the cloud could lead to a lack of visibility into network traffic flow logs within the VPC.
    Which of the following compensating controls would be BEST to implement in this situation?
  • Question 73

    Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?
  • Question 74

    A security engineer is hardening a company's multihomed SFTP server. When scanning a public-facing network interface, the engineer finds the following ports are open:
    22
    25
    110
    137
    138
    139
    445
    Internal Windows clients are used to transferring files to the server to stage them for customer download as part of the company's distribution process.
    Which of the following would be the BEST solution to harden the system?
  • Question 75

    A Chief information Security Officer (CISO) is developing corrective-action plans based on the following from a vulnerability scan of internal hosts:

    Which of the following MOST appropriate corrective action to document for this finding?