Question 31

A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company's services to ensure false positives do not drop legitimate traffic.
Which of the following would satisfy the requirement?
  • Question 32

    A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

    Which of the following would BEST mitigate this vulnerability?
  • Question 33

    An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items.
    Which of the following phases establishes the identification and prioritization of critical systems and functions?
  • Question 34

    Company A is establishing a contractual with Company B. The terms of the agreement are formalized in a document covering the payment terms, limitation of liability, and intellectual property rights. Which of the following documents will MOST likely contain these elements
  • Question 35

    An organization is developing a disaster recovery plan that requires data to be backed up and available at a moment's notice.
    Which of the following should the organization consider FIRST to address this requirement?