- (Exam Topic 1)
A junior security analyst iss conducting an analysis after passwords were changed on multiple accounts without users' interaction. The SIEM have multiple logtn entnes with the following text:
Which of Ihe following is the MOST likely attack conducted on the environment?
Correct Answer:
A
- (Exam Topic 6)
A security architect is implementing a new email architecture for a company. Due to security concerns, the Chief Information Security Officer would like the new architecture to support email encryption, as well as provide for digital signatures. Which of the following should the architect implement?
Correct Answer:
D
- (Exam Topic 5)
Which of the following environments utilizes dummy data and is MOST likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build?
Correct Answer:
B
- (Exam Topic 4)
To mitigate the impact of a single VM being compromised by another VM on the same hypervisor, an administrator would like to utilize a technical control to further segregate the traffic. Which of the
following solutions would BEST accomplish this objective?
Correct Answer:
B
- (Exam Topic 3)
An engineer wants to access sensitive data from a corporate-owned mobile device. Personal data is not allowed on the device. Which of the following MDM configurations must be considered when the engineer travels for business?
Correct Answer:
D