Question 21

A company in the financial sector receives a substantial number of customer transaction requests via email.
While doing a root-cause analysis conceding a security breach, the CIRT correlates an unusual spike in port 80 traffic from the IP address of a desktop used by a customer relations employee who has access to several of the compromised accounts. Subsequent antivirus scans of the device do not return an findings, but theCIRT finds undocumented services running on the device. Which of the following controls would reduce the discovery time for similar in the future.
  • Question 22

    A company has decided to purchase a license for software that is used to operate a mission-critical process.
    The third-party developer is new to the industry but is delivering what the company needs at this time.
    Which of the following BEST describes the reason why utilizing a source code escrow will reduce the operational risk to the company if the third party stops supporting the application?
  • Question 23

    Which of the following represents the MOST significant benefit of implementing a passwordless authentication solution?
  • Question 24

    A small company needs to reduce its operating costs. vendors have proposed solutions, which all focus on management of the company's website and services. The Chief information Security Officer (CISO) insist all available resources in the proposal must be dedicated, but managing a private cloud is not an option. Which of the following is the BEST solution for this company?
  • Question 25

    Clients are reporting slowness when attempting to access a series of load-balanced APIs that do not require authentication. The servers that host the APIs are showing heavy CPU utilization. No alerts are found on the WAFs sitting in front of the APIs.
    Which of the following should a security engineer recommend to BEST remedy the performance issues in a timely manner?