Question 6

A company recently acquired a SaaS provider and needs to integrate its platform into the company's existing infrastructure without impact to the customer's experience. The SaaS provider does not have a mature security program A recent vulnerability scan of the SaaS provider's systems shows multiple critical vulnerabilities attributed to very old and outdated Oss. Which of the following solutions would prevent these vulnerabilities from being introduced into the company's existing infrastructure?
  • Question 7

    Which of the following protocols is a low power, low data rate that allows for the creation of PAN networks?
  • Question 8

    A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
    Which of the following would be BEST for the developer to perform? (Choose two.)
  • Question 9

    A systems administrator is in the process of hardening the host systems before connecting to the network. The administrator wants to add protection to the boot loader to ensure the hosts are secure before the OS fully boots.
    Which of the following would provide the BEST boot loader protection?
  • Question 10

    A company plans to build an entirely remote workforce that utilizes a cloud-based infrastructure. The Chief Information Security Officer asks the security engineer to design connectivity to meet the following requirements:
    Only users with corporate-owned devices can directly access servers hosted by the cloud provider.
    The company can control what SaaS applications each individual user can access.
    User browser activity can be monitored.
    Which of the following solutions would BEST meet these requirements?