Question 56

A startup company is using multiple SaaS and IaaS platform to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?
  • Question 57

    A company recently experienced an attack in which a malicious actor was able to exfiltrate data by cracking stolen passwords, using a rainbow table the sensitive dat
    a. Which of the following should a security engineer do to prevent such an attack in the future?
  • Question 58

    Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
    INSTRUCTIONS
    Not all attacks and remediation actions will be used.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    Question 59

    An enterprise has hired an outside security firm to conduct penetration testing on its network and applications.
    The firm has only been given the documentation available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?
  • Question 60

    A security analyst generated a file named host1.pcap and shared it with a team member who is going to use it for further incident analysis. Which of the following tools will the other team member MOST likely use to open this file?