Question 46

After a security incident, a network security engineer discovers that a portion of the company's sensitive external traffic has been redirected through a secondary ISP that is not normally used.
Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?
  • Question 47

    A security consultant needs to protect a network of electrical relays that are used for monitoring and controlling the energy used in a manufacturing facility.
    Which of the following systems should the consultant review before making a recommendation?
  • Question 48

    A security analyst is performing a vulnerability assessment on behalf of a client. The analyst must define what constitutes a risk to the organization.
    Which of the following should be the analyst's FIRST action?
  • Question 49

    A security architect is given the following requirements to secure a rapidly changing enterprise with an increasingly distributed and remote workforce
    * Cloud-delivered services
    * Full network security stack
    * SaaS application security management
    * Minimal latency for an optimal user experience
    * Integration with the cloud 1AM platform
    Which of the following is the BEST solution?
  • Question 50

    A security analyst is validating the MAC policy on a set of Android devices. The policy was written to ensure non-critical applications are unable to access certain resources. When reviewing dmesg, the analyst notes many entries such as:
    Despite the deny message, this action was still permit following is the MOST likely fix for this issue?