Question 71

A company just released a new video card. Due to limited supply and high demand, attackers are employing automated systems to purchase the device through the company's web store so they can resell it on the secondary market. The company's intended customers are frustrated. A security engineer suggests implementing a CAPTCHA system on the web store to help reduce the number of video cards purchased through automated systems. Which of the following now describes the level of risk?
  • Question 72

    A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite:

    Which of the following is the MOST likely cause of the customer's inability to connect?
  • Question 73

    A security architect was asked to modify an existing internal network design to accommodate the following requirements for RDP:
    * Enforce MFA for RDP
    * Ensure RDP connections are only allowed with secure ciphers.
    The existing network is extremely complex and not well segmented. Because of these limitations, the company has requested that the connections not be restricted by network-level firewalls Of ACLs.
    Which of the following should the security architect recommend to meet these requirements?
  • Question 74

    An enterprise is undergoing an audit to review change management activities when promoting code to production. The audit reveals the following:
    * Some developers can directly publish code to the production environment.
    * Static code reviews are performed adequately.
    * Vulnerability scanning occurs on a regularly scheduled basis per policy.
    Which of the following should be noted as a recommendation within the audit report?
  • Question 75

    An organization is implementing a new identity and access management architecture with the following objectives:
    Supporting MFA against on-premises infrastructure
    Improving the user experience by integrating with SaaS applications
    Applying risk-based policies based on location
    Performing just-in-time provisioning
    Which of the following authentication protocols should the organization implement to support these requirements?