Question 176

Which of the following would BEST identify and remediate a data-loss event in an enterprise using third-party, web-based services and file-sharing platforms?
  • Question 177

    An enterprise has hired an outside security firm to conduct penetration testing on its network and applications.
    The firm has only been given the documentation available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?
  • Question 178

    Which of the following often operates in a client-server architecture to act as a service repository. providing enterprise consumers access to structured threat intelligence data?
  • Question 179

    Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?
  • Question 180

    A security analyst sees the following log output while reviewing web logs:

    Which of the following mitigation strategies would be BEST to prevent this attack from being successful?