Question 36

A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log.
Which of the following actions would BEST address the potential risks by the activity in the logs?
  • Question 37

    A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
    Which of the following would be BEST for the developer to perform? (Choose two.)
  • Question 38

    A small company recently developed prototype technology for a military program. The company's security engineer is concerned about potential theft of the newly developed, proprietary information.
    Which of the following should the security engineer do to BEST manage the threats proactively?
  • Question 39

    A company is outsourcing to an MSSP that performs managed detection and response services. The MSSP requires a server to be placed inside the network as a log aggregate and allows remote access to MSSP analyst. Critical devices send logs to the log aggregator, where data is stored for 12 months locally before being archived to a multitenant cloud. The data is then sent from the log aggregate to a public IP address in the MSSP datacenter for analysis.
    A security engineer is concerned about the security of the solution and notes the following.
    * The critical devise send cleartext logs to the aggregator.
    * The log aggregator utilize full disk encryption.
    * The log aggregator sends to the analysis server via port 80.
    * MSSP analysis utilize an SSL VPN with MFA to access the log aggregator remotely.
    * The data is compressed and encrypted prior to being achieved in the cloud.
    Which of the following should be the engineer's GREATEST concern?
  • Question 40

    Leveraging cryptographic solutions to protect data that is in use ensures the data is encrypted: