Question 21
An application developer accidentally uploaded a company's code-signing certificate private key to a public web server. The company is concerned about malicious use of its certificate. Which of the following should the company do FIRST?
Question 22
A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen: Please use a combination of numbers, special characters, and letters in the password field. Which of the following concepts does this message describe?
Question 23
A security analyst is concerned about critical vulnerabilities that have been detected on some applications running inside containers Which of the following is the BEST remediation strategy?
Question 24
Which of the following control types is focused primarily on reducing risk before an incident occurs?
Question 25
Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?