Question 51

A large telecommunications equipment manufacturer needs to evaluate the strengths of security controls in a new telephone network supporting first responders. Which of the following techniques would the company use to evaluate data confidentiality controls?
  • Question 52

    A company is preparing to deploy a global service.
    Which of the following must the company do to ensure GDPR compliance? (Choose two.)
  • Question 53

    A company is outsourcing to an MSSP that performs managed detection and response services. The MSSP requires a server to be placed inside the network as a log aggregate and allows remote access to MSSP analyst. Critical devices send logs to the log aggregator, where data is stored for 12 months locally before being archived to a multitenant cloud. The data is then sent from the log aggregate to a public IP address in the MSSP datacenter for analysis.
    A security engineer is concerned about the security of the solution and notes the following.
    * The critical devise send cleartext logs to the aggregator.
    * The log aggregator utilize full disk encryption.
    * The log aggregator sends to the analysis server via port 80.
    * MSSP analysis utilize an SSL VPN with MFA to access the log aggregator remotely.
    * The data is compressed and encrypted prior to being achieved in the cloud.
    Which of the following should be the engineer's GREATEST concern?
  • Question 54

    Due to locality and budget constraints, an organization's satellite office has a lower bandwidth allocation than other offices in the organization. As a result, the local security infrastructure staff is assessing architectural options that will help preserve network bandwidth and increase speed to both internal and external resources while not sacrificing threat visibility.
    Which of the following would be the BEST option to implement?
  • Question 55

    A security architect is given the following requirements to secure a rapidly changing enterprise with an increasingly distributed and remote workforce
    * Cloud-delivered services
    * Full network security stack
    * SaaS application security management
    * Minimal latency for an optimal user experience
    * Integration with the cloud 1AM platform
    Which of the following is the BEST solution?