Question 86

An organization is prioritizing efforts to remediate or mitigate risks identified during the latest assessment. For one of the risks, a full remediation was not possible, but the organization was able to successfully apply mitigations to reduce the likelihood of impact.
Which of the following should the organization perform NEXT?
  • Question 87

    An organization decided to begin issuing corporate mobile device users microSD HSMs that must be installed in the mobile devices in order to access corporate resources remotely. Which of the following features of these devices MOST likely led to this decision? (Select TWO.)
  • Question 88

    A company is looking for a solution to hide data stored in databases. The solution must meet the following requirements:
    Be efficient at protecting the production environment
    Not require any change to the application
    Act at the presentation layer
    Which of the following techniques should be used?
  • Question 89

    A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals.
    Which of the following does the business's IT manager need to consider?
  • Question 90

    A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer's laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy.
    Which of the following solutions should the security architect recommend?