Question 91

Which of the following technologies can be used to store digital certificates and is typically used in high-security implementations where integrity is paramount?
  • Question 92

    A cybersecurity analyst is investigating an incident report concerning a specific user workstation.
    The workstation is exhibiting high CPU and memory usage, even when first started, and network bandwidth usage is extremely high. The user reports that applications crash frequently, despite the fact that no significant changes in work habits have occurred. An antivirus scan reports no known threats. Which of the following is the MOST likely reason for this?
  • Question 93

    A monthly job to install approved vendor software updates and hot fixes recently stopped working. The security team performed a vulnerability scan, which identified several hosts as having some critical OS vulnerabilities, as referenced in the common vulnerabilities and exposures (CVE) database.
    Which of the following should the security team do NEXT to resolve the critical findings in the most effective manner? (Choose two.)
  • Question 94

    A cybersecurity analyst has been asked to follow a corporate process that will be used to manage vulnerabilities for an organization. The analyst notices the policy has not been updated in three years. Which of the following should the analyst check to ensure the policy is still accurate?
  • Question 95

    A large insurance company wants to outsource its claim-handling operations to an overseas third-party organization Which of the following would BEST help to reduce the chance of highly sensitive data leaking?