Question 16

A development team uses open-source software and follows an Agile methodology with two-week sprints. Last month, the security team filed a bug for an insecure version of a common library. The DevOps team updated the library on the server, and then the security team rescanned the server to verify it was no longer vulnerable. This month, the security team found the same vulnerability on the server.
Which of the following should be done to correct the cause of the vulnerability?
  • Question 17

    A security team wants to make SaaS solutions accessible from only the corporate campus.
    Which of the following would BEST accomplish this goal?
  • Question 18

    A security analyst needs to reduce the overall attack surface.
    Which of the following infrastructure changes should the analyst recommend?
  • Question 19

    The IT department is concerned about the possibility of a guest device infecting machines on the corporate network or taking down the company's singe internet connection. Which of the following should a security analyst recommend to BEST meet the requirements outlined by the IT Department?
  • Question 20

    A cybersecurity analyst is investigating a potential incident affecting multiple systems on a company's internal network. Although there is a negligible impact to performance, the following symptom present on each of the affected systems:
    * Existence of a new and unexpected svchost exe process
    * Persistent, outbound TCP/IP connections to an unknown external host with routine keep-alives transferred
    * DNS query logs showing successful name resolution for an Internet-resident dynamic DNS domain
    If this situation remains unresolved, which of the following will MOST likely occur?