Question 86

A development team employs a practice of bringing all the code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code and track source code through version control. Which of the following BEST describes this process?
  • Question 87

    In which of the following risk management strategies would cybersecurity insurance be used?
  • Question 88

    An attacker is exploiting a vulnerability that does not have a patch available. Which of the following is the attacker exploiting?
  • Question 89

    A company suspects that some corporate accounts were compromised. The number of suspicious logins from locations not recognized by the users is increasing. Employees who travel need their accounts protected without the risk of blocking legitimate login requests that may be made over new sign-in properties. Which of the following security controls can be implemented?
  • Question 90

    A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server:

    Which of the following BEST describes this kind of attack?