Question 11

Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?
  • Question 12

    Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?
  • Question 13

    Which biometric error would allow an unauthorized user to access a system?
  • Question 14

    A security analyst receives an alert from trie company's SIEM that anomalous activity is coming from a local source IP address of 192.168.34.26. The Chief Information Security Officer asks the analyst to block the originating source Several days later, another employee opens an internal ticket stating that vulnerability scans are no longer being performed properly. The IP address the employee provides is 192 168.3426. Which of the following describes this type of alert?
  • Question 15

    A cloud service provider has created an environment where customers can connect existing local networks to the cloud for additional computing resources and block internal HR applications from reaching the cloud.
    Which of the following cloud models is being used?