Question 61

A financial services company wants to migrate its email services from on-premises servers to a cloud-based email solution. The Chief information Security Officer (CISO) must brief board of directors on the potential security concerns related to this migration. The board is concerned about the following.
* Transactions being required by unauthorized individual
* Complete discretion regarding client names, account numbers, and investment information.
* Malicious attacker using email to distribute malware and ransom ware.
* Exfiltration of sensitivity company information.
The cloud-based email solution will provide an6-malware, reputation-based scanning, signature-based scanning, and sandboxing. Which of the following is the BEST option to resolve the board's concerns for this email migration?
  • Question 62

    An organization is researching the automation capabilities for systems within an OT network. A security analyst wants to assist with creating secure coding practices and would like to learn about the programming languages used on the PLCs. Which of the following programming languages is the MOST relevant for PLCs?
  • Question 63

    A company is implementing SSL inspection. During the next six months, multiple web applications that will be separated out with subdomains will be deployed.
    Which of the following will allow the inspection of the data without multiple certificate deployments?
  • Question 64

    A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log:
    graphic.ssh_auth_log.
    Which of the following actions would BEST address the potential risks by the activity in the logs?
  • Question 65

    A threat analyst notices the following URL while going through the HTTP logs.

    Which of the following attack types is the threat analyst seeing?