Question 46

A company is preparing to deploy a global service.
Which of the following must the company do to ensure GDPR compliance? (Choose two.)
  • Question 47

    A security consultant needs to set up wireless security for a small office that does not have Active Directory. Despite the lack of central account management, the office manager wants to ensure a high level of defense to prevent brute-force attacks against wireless authentication.
    Which of the following technologies would BEST meet this need?
  • Question 48

    An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key.
    Which of the following would BEST secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?
  • Question 49

    A security engineer estimates the company's popular web application experiences 100 attempted breaches per day. In the past four years, the company's data has been breached two times.
    Which of the following should the engineer report as the ARO for successful breaches?
  • Question 50

    A company wants to protect its intellectual property from theft. The company has already applied ACLs and DACs.
    Which of the following should the company use to prevent data theft?