Question 91

A development team created a mobile application that contacts a company's back-end APIs housed in a PaaS environment. The APIs have been experiencing high processor utilization due to scraping activities. The security engineer needs to recommend a solution that will prevent and remedy the behavior.
Which of the following would BEST safeguard the APIs? (Choose two.)
  • Question 92

    A security is assisting the marketing department with ensuring the security of the organization's social media platforms. The two main concerns are:
    The Chief marketing officer (CMO) email is being used department wide as the username The password has been shared within the department Which of the following controls would be BEST for the analyst to recommend?
  • Question 93

    A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive.

    Based on the output above, from which of the following process IDs can the analyst begin an investigation?
  • Question 94

    An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items.
    Which of the following phases establishes the identification and prioritization of critical systems and functions?
  • Question 95

    A company is outsourcing to an MSSP that performs managed detection and response services. The MSSP requires a server to be placed inside the network as a log aggregate and allows remote access to MSSP analyst.
    Critical devices send logs to the log aggregator, where data is stored for 12 months locally before being archived to a multitenant cloud. The data is then sent from the log aggregate to a public IP address in the MSSP datacenter for analysis.
    A security engineer is concerned about the security of the solution and notes the following.
    * The critical devise send cleartext logs to the aggregator.
    * The log aggregator utilize full disk encryption.
    * The log aggregator sends to the analysis server via port 80.
    * MSSP analysis utilize an SSL VPN with MFA to access the log aggregator remotely.
    * The data is compressed and encrypted prior to being achieved in the cloud.
    Which of the following should be the engineer's GREATEST concern?