Question 141

An organization has various applications that contain sensitive data hosted in the cloud. The company's leaders are concerned about lateral movement across applications of different trust levels. Which of the following solutions should the organization implement to address the concern?
  • Question 142

    A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).
  • Question 143

    A network administrator has been asked to install an IDS to improve the security posture of an organization. Which of the following control types is an IDS?
  • Question 144

    Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?
  • Question 145

    Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?