Which of the following allows computation and analysis of data within a ciphertext without knowledge of the pl
Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext? A. Lattice-based cryptography B. Quantum computing C. Asymmetric cryptography D. Homomorphic encryption Reference: https://searchsecurity.techtarget.com/definition/cryptanalysis
An organization is implementing a new identity and access management architecture with the following objective
An organization is implementing a new identity and access management architecture with the following objectives: Supporting MFA against on-premises infrastructure Improving the user experience by integrating with SaaS applications Applying risk-based policies based on location Performing just-in-time provisioning Which of the following authentication protocols should the organization implement to support these requirements? A. Kerberos and […]
Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?
Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity? A. Key sharing B. Key distribution C. Key recovery D. Key escrow Reference: https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48322§ion=1.3
A security analyst is reviewing the following output: Request URL: http://www.largeworldwidebank.org/../../../etc/password Request Method: GET Status Code: 200 OK Remote Address: 107.240.1.127:443 Content-Length: 1245 Content—Type: text/html Date: Tue, 03 Nov 2020 19:47:14 GMT Server: Microsoft—IIS/10.0 X-Powered-By: ASP.NET Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 Accept—Encoding: gzip, deflate Accept—Language: en—Us,en;q:0.9 Cache—Control: max—age:0 Connection: keep—alive Host: www.largeworldwidebank.org/ User—Agent: Mozilla/5.0 (Windows NT 10.0; Win64; […]
A SOC analyst is reviewing malicious activity on an external, exposed web server.
A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application. Which of the following is the MOST likely cause? A. The user agent client is not compatible with […]
A company is preparing to deploy a global service.
A company is preparing to deploy a global service. Which of the following must the company do to ensure GDPR compliance? (Choose two.) A. Inform users regarding what data is stored. B. Provide opt-in/out for marketing messages. C. Provide data deletion capabilities. D. Provide optional data encryption. E. Grant data access to third parties. F. […]
During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned
During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able […]
In preparation for the holiday season, a company redesigned the system that manages retail sales and moved it
In preparation for the holiday season, a company redesigned the system that manages retail sales and moved it to a cloud service provider. The new infrastructure did not meet the company’s availability requirements. During a postmortem analysis, the following issues were highlighted: 1. International users reported latency when images on the web page were initially […]
A company created an external application for its customers.
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.) A. Conduct input sanitization. B. Deploy a SIEM. C. Use containers. […]
An organization is preparing to migrate its production environment systems from an on-premises environment to
An organization is preparing to migrate its production environment systems from an on-premises environment to a cloud service. The lead security architect is concerned that the organization’s current methods for addressing risk may not be possible in the cloud environment. Which of the following BEST describes the reason why traditional methods of addressing risk may […]