A financial institution is concerned about a potential data breach due to employees accessing the company network using personal devices. They have decided to implement a bring your own device (BYOD) policy to mitigate the risk.
Which risk mitigation strategy will reduce the risk of a data breach in this scenario?
An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services. Which protocol will offer the most reliable and secure method for data transport?
Which statement best describes the purpose of a business intelligence (Bl) system?
Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?
Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?
Match the legislative purpose with the corresponding legislation.
Answer options may be used more than once or not at all.
A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.
Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?
An IT organization is deploying a new secure Simple Mail Transfer Protocol (SMTP) server to handle email communications for the company. The company must ensure that the servers are secure and protected from external threats. The SMTP servers should be able to communicate with the internal network and the internet, but all incoming and outgoing traffic should be inspected and filtered to prevent cyberattacks.
A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company's servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which hardening technique will meet the needs of this company?