Question 101

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?
  • Question 102

    The Chief information Officer (CIO) asks the system administrator to improve email security at the company based on the following requirements:
    * Transaction being requested by unauthorized individuals.
    * Complete discretion regarding client names, account numbers, and investment information.
    * Malicious attackers using email to malware and ransomeware.
    * Exfiltration of sensitive company information.
    The cloud-based email solution will provide anti-malware reputation-based scanning, signature-based scanning, and sandboxing. Which of the following is the BEST option to resolve the boar's concerns for this email migration?
  • Question 103

    A security analyst is reading the results of a successful exploit that was recently conducted by third-party penetration testers. The testers reverse engineered a privileged executable. In the report, the planning and execution of the exploit is detailed using logs and outputs from the test However, the attack vector of the exploit is missing, making it harder to recommend remediation's. Given the following output:

    The penetration testers MOST likely took advantage of:
  • Question 104

    A recent data breach revealed that a company has a number of files containing customer data across its storage environment. These files are individualized for each employee and are used in tracking various customer orders, inquiries, and issues. The files are not encrypted and can be accessed by anyone. The senior management team would like to address these issues without interrupting existing processes.
    Which of the following should a security architect recommend?
  • Question 105

    A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used. The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security.
    Which of the following encryption methods should the cloud security engineer select during the implementation phase?