Question 76

A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used. The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security.
Which of the following encryption methods should the cloud security engineer select during the implementation phase?
  • Question 77

    A new web server must comply with new secure-by-design principles and PCI DSS. This includes mitigating the risk of an on-path attack. A security analyst is reviewing the following web server configuration:

    Which of the following ciphers should the security analyst remove to support the business requirements?
  • Question 78

    After a security incident, a network security engineer discovers that a portion of the company's sensitive external traffic has been redirected through a secondary ISP that is not normally used.
    Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?
  • Question 79

    An energy company is required to report the average pressure of natural gas used over the past quarter. A PLC sends data to a historian server that creates the required reports.
    Which of the following historian server locations will allow the business to get the required reports in an OT and IT environment?
  • Question 80

    A network architect is designing a new SD-WAN architecture to connect all local sites to a central hub site. The hub is then responsible for redirecting traffic to public cloud and datacenter applications. The SD-WAN routers are managed through a SaaS, and the same security policy is applied to staff whether working in the office or at a remote location. The main requirements are the following:
    1. The network supports core applications that have 99.99% uptime.
    2. Configuration updates to the SD-WAN routers can only be initiated from the management service.
    3. Documents downloaded from websites must be scanned for malware.
    Which of the following solutions should the network architect implement to meet the requirements?