Question 76

A development team employs a practice of bringing all the code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code and track source code through version control. Which of the following BEST describes this process?
  • Question 77

    A security analyst needs to generate a server certificate to be used for 802.1X and secure RDP connections.
    The analyst is unsure what is required to perform the task and solicits help from a senior colleague. Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?
  • Question 78

    A RAT that was used to compromise an organization's banking credentials was found on a user's computer.
    The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set. Which of the following recommendations would BEST prevent this from reoccurring?
  • Question 79

    Which of the following policies would help an organization identify and mitigate potential single points of failure in the company's IT/security operations?
  • Question 80

    A commercial cyber-threat intelligence organization observes IoCs across a variety of unrelated customers.
    Prior to releasing specific threat intelligence to other paid subscribers, the organization is MOST likely obligated by contracts to: