Question 16
A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer's laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy.
Which of the following solutions should the security architect recommend?
Which of the following solutions should the security architect recommend?
Question 17
A cybersecurity analyst discovered a private key that could have been exposed.
Which of the following is the BEST way for the analyst to determine if the key has been compromised?
Which of the following is the BEST way for the analyst to determine if the key has been compromised?
Question 18
An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key.
Which of the following would BEST secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?
Which of the following would BEST secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?
Question 19
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.
Which of the following actions would BEST resolve the issue? (Choose two.)
Which of the following actions would BEST resolve the issue? (Choose two.)
Question 20
A company requires a task to be carried by more than one person concurrently. This is an example of: