Question 51

An administrator logged in to a cloud account on a shared machine but forgot to log out after the session ended. Which of the following types of security threats does this action pose?
  • Question 52

    End users are getting certificate errors and are unable to connect to an application deployed in a cloud. The application requires HTTPS connection. A network solution architect finds that a firewall is deployed between end users and the application in the cloud. Which of the following is the root cause of the issue?
  • Question 53

    A company is expanding operations and opening a new facility. The executive leadership team decides to purchase an insurance policy that will cover the cost of rebuilding the facility in case of a natural disaster.
    Which of the following describes the team's decision?
  • Question 54

    A company's IT department is expected to grow from 100 to 200 employees, and the sales department is expected to grow from 1,000 to a maximum of 2,000 employees. Each employee owns a single laptop with a single IP allocated. The network architect wants to deploy network segmentation using the IP range 10.0.0.0
    /8. Which of the following is the best solution?
  • Question 55

    A security architect needs to increase the security controls around computer hardware installations. The requirements are:
    Auditable access logs to computer rooms
    Alerts for unauthorized access attempts
    Remote visibility to the inside of computer rooms
    Which of the following controls best meet these requirements? (Choose two.)