ログイン

CNL_CH_8

CNL_CH_8
66問 • 2年前
  • Son Cagrı
  • 通報

    問題一覧

  • 1

    A security forensics analyst is examining a virtual server. The analyst wants to preserve the present state of the virtual server, including memory contents. Which of the following backup types should be used?

    Snapshot

  • 2

    Which of the following is a risk that is specifically associated with hosting applications in the public cloud?

    Shared tenancy

  • 3

    A company is implementing BYOD and wants to ensure all users have access to the same cloud-based services. Which of the following would BEST allow the company to meet this requirement?

    SaaS

  • 4

    DDoS attacks are causing an overload on the cluster of cloud servers. A security architect is researching alternatives to make the cloud environment respond to load fluctuation in a cost-effective way. Which of the following options BEST fulfills the architect’s requirements?

    An orchestration solution that can adjust scalability of cloud assets

  • 5

    A security analyst is concerned about critical vulnerabilities that have been detected on some applications running inside containers. Which of the following is the BEST remediation strategy?

    Update the base container image and redeploy the environment

  • 6

    A cloud service provider has created an environment where customers can connect existing local networks to the cloud for additional computing resources and block internal HR applications from reaching the cloud. Which of the following cloud models is being used?

    Hybrid

  • 7

    A company is looking to migrate some servers to the cloud to minimize its technology footprint. The company has 100 databases that are on premises. Which of the following solutions will require the LEAST management and support from the company?

    SaaS

  • 8

    To reduce and limit software and infrastructure costs, the Chief Information Officer has requested to move email services to the cloud. The cloud provider and the organization must have security controls to protect sensitive data. Which of the following cloud services would BEST accommodate the request?

    SaaS

  • 9

    Which of the following BEST describes when an organization utilizes a ready-to-use application from a cloud provider?

    SaaS

  • 10

    A startup company is using multiple SaaS and IaaS platform to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?

    CASB

  • 11

    Which of the following stores data directly on devices with limited processing and storage capacity?

    Thin client

  • 12

    A company has a flat network that is deployed in the cloud. Security policy states that all production and development servers must be segmented. Which of the following should be used to design the network to meet the security requirements?

    VPC (Virtual private cloud)

  • 13

    A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking. Which of the following cloud service provider types should business engage?

    XaaS

  • 14

    A security analyst is receiving numerous alerts reporting that the response time of an internet-facing application has been degraded. However, the internal network performance was not degraded. Which of the following MOST likely explains this behavior?

    DDoS attack

  • 15

    After multiple on-premises security solutions were migrated to the cloud, the incident response time increased. The analysts are spending a long time tracing information on different cloud consoles and correlating data in different formats. Which of the following can be used to optimize the incident response time?

    CASB

  • 16

    Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?

    Transit gateway

  • 17

    A company is considering transitioning to the cloud. The company employs individuals from various locations around the world. The company does not want to increase its on-premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of the company?

    Hybrid environment

  • 18

    Several universities are participating in a collaborative research project and need to share compute and storage resources. Which of the following cloud deployment strategies would BEST meet this need?

    Community

  • 19

    A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately protected from advanced threats and malware. The CSO believes there is a high risk that a data breach could occur in the near future due to the lack of detective and preventive controls. Which of the following should be implemented to BEST address the CSO's concerns? {Select TWO)

    A CASB, An NG-SWG

  • 20

    The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?

    CASB

  • 21

    A company is moving its retail website to a public cloud provider. The company wants to tokenize credit card data but not allow the cloud provider to see the stored credit card information. Which of the following would BEST meet these objectives?

    CASB

  • 22

    Server administrators want to configure a cloud solution so that computing memory and processor usage is maximized most efficiently across a number of virtual servers. They also need to avoid potential denial-of-service situations caused by availability. Which of the following should administrators configure to maximize system availability while efficiently utilizing available computing power?

    Dynamic Resource Allocation

  • 23

    A company reduced the area utilized in its datacenter by creating virtual networking through automation and by creating provisioning routes and rules through scripting. Which of the following does this example describe?

    laC (Infrastructure as Code)

  • 24

    A startup company is using multiple SaaS and IaaS platforms to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?

    CASB (cloud access security broker)

  • 25

    Which of the following distributes data among nodes, making it more difficult to manipulate the data while also minimizing downtime?

    Fog computing

  • 26

    An organization has decided to host its web application and database in the cloud. Which of the following BEST describes the security concerns for this decision?

    The cloud vendor is a new attack vector within the supply chain.

  • 27

    Which of the following is a risk that is specifically associated with hosting applications in the public cloud?

    Shared tenancy

  • 28

    Which of the following cloud models provides clients with servers, storage, and networks but nothing else?

    IaaS

  • 29

    A company has decided to move its operations to the cloud. It wants to utilize technology that will prevent users from downloading company applications for personal use, restrict data that is uploaded, and have visibility into which applications are being used across the company. Which of the following solutions will BEST meet these requirements?

    A CASB

  • 30

    A Chief Executive Officer (CEO) is dissatisfied with the level of service from the company's new service provider. The service provider is preventing the CEO from sending email from a work account to a personal account. Which of the following types of service providers is being used?

    Managed security service provider

  • 31

    Which of the following describes the ability of code to target a hypervisor from inside?

    VM escape

  • 32

    An engineer is setting up a VDI environment for a factory location, and the business wants to deploy a low-cost solution to enable users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?

    Thin clients

  • 33

    A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider. Which of the following should the administrator use?

    MSSP

  • 34

    A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software compatibility issues. The OSs are still supported by the vendor, but the industrial software is no longer supported. The Chief Information Security Officer (CISO) has created a resiliency plan for these systems that will allow OS patches to be installed in a non-production environment, while also creating backups of the systems for recovery. Which of the following resiliency techniques will provide these capabilities?

    Virtual machines

  • 35

    A network administrator is concerned about users being exposed to malicious content when accessing company cloud applications. The administrator wants to be able to block access to sites based on the AUP. (acceptable use policy). The users must also be protected because many of them work from home or at remote locations, providing on-site customer support. Which of the following should the administrator employ to meet these criteria?

    Implement an SWG

  • 36

    To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization?

    SaaS

  • 37

    Following a prolonged datacenter outage that affected web-based sales, a company has decided to move its operations to a private cloud solution. The security team has received the following requirements: • There must be visibility into how teams are using cloud-based services. • The company must be able to identify when data related to payment cards is being sent to the cloud. • Data must be available regardless of the end user's geographic location • Administrators need a single pane-of-glass view into traffic and trends. Which of the following should the security analyst recommend?

    Implement a CASB solution.

  • 38

    A well-known organization has been experiencing attacks from APIs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots. Which of the following is the BEST defense against this scenario?

    Implementing application execution in a sandbox for unknown software.

  • 39

    A SOC is currently being outsourced. Which of the following is being used?

    MSSP

  • 40

    A cloud administrator is configuring five computer instances under the same subnet in a VPC. Three instances are required to communicate with one another, and the other two must be logically isolated from all other instances in the VPC. Which of the following must the administrator configure to meet this requirement?

    Two security groups

  • 41

    An organization has various applications that contain sensitive data hosted in the cloud. The company’s leaders are concerned about lateral movement across applications of different trust levels. Which of the following solutions should the organization implement to address the concern?

    CASB

  • 42

    When planning to build a virtual environment, an administrator need to achieve the following; ● Establish policies in limit who can create new VMs ● Allocate resources according to actual utilization ● Require justification for requests outside of the standard requirements ● Create standardized categories based on size and resource requirements Which of the following is the administrator MOST likely trying to do?

    Avoid VM sprawl

  • 43

    A cloud service provider has created an environment where customers can connect existing local networks to the cloud for additional computing resources and block internal HR applications from reaching the cloud. Which of the following cloud models is being used?

    Hybrid

  • 44

    Hackers recently attacked a company's network and obtained several unfavorable pictures from the Chief Executive Officer's workstation. The hackers are threatening to send the images to the press if a ransom is not paid. Which of the following is impacted the MOST?

    Reputation

  • 45

    A smart retail business has a local store and a newly established and growing online storefront. A recent storm caused a power outage to the business and the local ISP, resulting in several hours of lost sales and delayed order processing. The business owner now needs to ensure two things: * Protection from power outages * Always-available connectivity In case of an outage The owner has decided to implement battery backups for the computer equipment Which of the following would BEST fulfill the owner’s second need?

    Purchase services from a cloud provider for high availability

  • 46

    A Chief Information Security Officer (CISO) wants to implement a new solution that can protect against certain categories of websites, whether the employee is in the office or away. Which of the following solutions should the CISO implement?

    SWG

  • 47

    The Chief Information Security Officer (CISO) has decided to reorganize security staff to concentrate on incident response and to outsource outbound Internet URL categorization and filtering to an outside company. Additionally, the CISO would like this solution to provide the same protections even when a company laptop or mobile device is away from a home office. Which of the following should the CISO choose?

    Next-generation SWG

  • 48

    A healthcare company is revamping its IT strategy in light of recent regulations. The company is concerned about compliance and wants to use a pay-per-use model. Which of the following is the BEST solution?

    Public SaaS

  • 49

    An organization’s help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command: ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an impacted machine, and the issue goes away. Which of the following attacks MOST likely occurred on the original DNS server?

    DNS cache poisoning

  • 50

    Employees are having issues accessing the company's website. Some employees report very slow performance, while others cannot open the website at all. The web and security administrators search the logs and find millions of half-open connections to port 443 on the web server. Further analysis reveals thousands of different source IPs initiating this traffic. Which of the following attacks is MOST likely occurring?

    DDoS

  • 51

    A security analyst is reviewing the following output from a system:Which of the following is MOST likely being observed?

    Denial of service (DoS)

  • 52

    A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?

    MSSP

  • 53

    A grocery store is expressing security and reliability concerns regarding the on-site backup strategy currently being performed by locally attached disks. The main concerns are the physical security of the backup media and the durability of the data stored on these devices. Which of the following is a cost-effective approach to address these concerns?

    Migrate to a cloud backup solution

  • 54

    A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service Unavailable error. The analyst runs a netstat-an command to discover if the web server is up and listening. The analyst receives the following output: TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT Which of the following types of attack is the analyst seeing?

    Denial of service

  • 55

    A security administrator has received multiple calls from the help desk about customers who are unable to access the organization's web server. Upon reviewing the log files, the security administrator determines multiple open requests have been made from multiple IP addresses, which is consuming system resources. Which of the following attack types does this BEST describe?

    DDoS

  • 56

    A web architect would like to move a company's website presence to the cloud. One of the management team's key concerns is resiliency in case a cloud provider's data center or network connection goes down. Which of the following should the web architect consider to address this concern?

    Availability zones

  • 57

    Cloud security engineers are planning to allow and deny access to specific features in order to increase data security. Which of the following cloud features is the most appropriate to ensure access is granted properly?

    Resource policies

  • 58

    A company would like to move to the cloud. The company wants to prioritize control and security over cost and ease of management. Which of the following cloud models would best suit this company's priorities?

    Private

  • 59

    A police department is using the cloud to share information with city officials. Which of the cloud models describes this scenario?

    Community

  • 60

    Which of the following would be best to ensure data is saved to a location on a server, is easily scaled, and is centrally monitored?

    Containers

  • 61

    A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?

    DDoS

  • 62

    Several users have been violating corporate security policy by accessing inappropriate Sites on corporate-issued mobile devices while off campus. The senior leadership team wants all mobile devices to be hardened with controls that: ● Limit the sites that can be accessed ● Only allow access to internal resources while physically on campus. ● Restrict employees from downloading images from company email Which of the following controls would best address this situation? (Select two).

    Content management, Geofencing

  • 63

    An engineer is using scripting to deploy a network in a cloud environment. Which of the following describes this scenario?

    SDN

  • 64

    An analyst is concerned about data leaks and wants to restrict access to internet services to authorized users only. The analyst also wants to control the actions each user can perform on each service. Which of the following would be the best technology for the analyst to consider implementing?

    CASB

  • 65

    A company's legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?

    Geolocation policy

  • 66

    A company has had several malware incidents that have been traced back to users accessing personal SaaS applications on the internet from the company network. The company has a policy that states users can only access business-related cloud applications from within the company network. Which of the following technical solutions should be used to enforce the policy?

    Leverage a cloud access security broker.

  • CNL_CH_1

    CNL_CH_1

    Son Cagrı · 3回閲覧 · 185問 · 2年前

    CNL_CH_1

    CNL_CH_1

    3回閲覧 • 185問 • 2年前
    Son Cagrı

    CNL_CH_2

    CNL_CH_2

    Son Cagrı · 109問 · 2年前

    CNL_CH_2

    CNL_CH_2

    109問 • 2年前
    Son Cagrı

    CNL_CH_3

    CNL_CH_3

    Son Cagrı · 90問 · 2年前

    CNL_CH_3

    CNL_CH_3

    90問 • 2年前
    Son Cagrı

    CNL_CH_4

    CNL_CH_4

    Son Cagrı · 48問 · 2年前

    CNL_CH_4

    CNL_CH_4

    48問 • 2年前
    Son Cagrı

    CNL_CH_5

    CNL_CH_5

    Son Cagrı · 83問 · 2年前

    CNL_CH_5

    CNL_CH_5

    83問 • 2年前
    Son Cagrı

    CNL_CH_6

    CNL_CH_6

    Son Cagrı · 100問 · 2年前

    CNL_CH_6

    CNL_CH_6

    100問 • 2年前
    Son Cagrı

    CNL_CH_7

    CNL_CH_7

    Son Cagrı · 43問 · 2年前

    CNL_CH_7

    CNL_CH_7

    43問 • 2年前
    Son Cagrı

    CNL_CH_9

    CNL_CH_9

    Son Cagrı · 49問 · 2年前

    CNL_CH_9

    CNL_CH_9

    49問 • 2年前
    Son Cagrı

    CNL_CH_10

    CNL_CH_10

    Son Cagrı · 75問 · 2年前

    CNL_CH_10

    CNL_CH_10

    75問 • 2年前
    Son Cagrı

    CNL_CH_11

    CNL_CH_11

    Son Cagrı · 118問 · 2年前

    CNL_CH_11

    CNL_CH_11

    118問 • 2年前
    Son Cagrı

    CNL_CH_12

    CNL_CH_12

    Son Cagrı · 124問 · 2年前

    CNL_CH_12

    CNL_CH_12

    124問 • 2年前
    Son Cagrı

    CNL_CH_13

    CNL_CH_13

    Son Cagrı · 95問 · 2年前

    CNL_CH_13

    CNL_CH_13

    95問 • 2年前
    Son Cagrı

    21 Mayis

    21 Mayis

    Son Cagrı · 69問 · 1年前

    21 Mayis

    21 Mayis

    69問 • 1年前
    Son Cagrı

    20 Mayis -175-

    20 Mayis -175-

    Son Cagrı · 174問 · 1年前

    20 Mayis -175-

    20 Mayis -175-

    174問 • 1年前
    Son Cagrı

    30 Mayis

    30 Mayis

    Son Cagrı · 209問 · 1年前

    30 Mayis

    30 Mayis

    209問 • 1年前
    Son Cagrı

    A-1

    A-1

    Son Cagrı · 216問 · 1年前

    A-1

    A-1

    216問 • 1年前
    Son Cagrı

    A-2

    A-2

    Son Cagrı · 184問 · 1年前

    A-2

    A-2

    184問 • 1年前
    Son Cagrı

    A-3

    A-3

    Son Cagrı · 68問 · 1年前

    A-3

    A-3

    68問 • 1年前
    Son Cagrı

    exam topics

    exam topics

    Son Cagrı · 306問 · 1年前

    exam topics

    exam topics

    306問 • 1年前
    Son Cagrı

    pass4future

    pass4future

    Son Cagrı · 330問 · 1年前

    pass4future

    pass4future

    330問 • 1年前
    Son Cagrı

    son 1

    son 1

    Son Cagrı · 349問 · 1年前

    son 1

    son 1

    349問 • 1年前
    Son Cagrı

    son 2

    son 2

    Son Cagrı · 113問 · 1年前

    son 2

    son 2

    113問 • 1年前
    Son Cagrı

    son 3

    son 3

    Son Cagrı · 63問 · 1年前

    son 3

    son 3

    63問 • 1年前
    Son Cagrı

    問題一覧

  • 1

    A security forensics analyst is examining a virtual server. The analyst wants to preserve the present state of the virtual server, including memory contents. Which of the following backup types should be used?

    Snapshot

  • 2

    Which of the following is a risk that is specifically associated with hosting applications in the public cloud?

    Shared tenancy

  • 3

    A company is implementing BYOD and wants to ensure all users have access to the same cloud-based services. Which of the following would BEST allow the company to meet this requirement?

    SaaS

  • 4

    DDoS attacks are causing an overload on the cluster of cloud servers. A security architect is researching alternatives to make the cloud environment respond to load fluctuation in a cost-effective way. Which of the following options BEST fulfills the architect’s requirements?

    An orchestration solution that can adjust scalability of cloud assets

  • 5

    A security analyst is concerned about critical vulnerabilities that have been detected on some applications running inside containers. Which of the following is the BEST remediation strategy?

    Update the base container image and redeploy the environment

  • 6

    A cloud service provider has created an environment where customers can connect existing local networks to the cloud for additional computing resources and block internal HR applications from reaching the cloud. Which of the following cloud models is being used?

    Hybrid

  • 7

    A company is looking to migrate some servers to the cloud to minimize its technology footprint. The company has 100 databases that are on premises. Which of the following solutions will require the LEAST management and support from the company?

    SaaS

  • 8

    To reduce and limit software and infrastructure costs, the Chief Information Officer has requested to move email services to the cloud. The cloud provider and the organization must have security controls to protect sensitive data. Which of the following cloud services would BEST accommodate the request?

    SaaS

  • 9

    Which of the following BEST describes when an organization utilizes a ready-to-use application from a cloud provider?

    SaaS

  • 10

    A startup company is using multiple SaaS and IaaS platform to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?

    CASB

  • 11

    Which of the following stores data directly on devices with limited processing and storage capacity?

    Thin client

  • 12

    A company has a flat network that is deployed in the cloud. Security policy states that all production and development servers must be segmented. Which of the following should be used to design the network to meet the security requirements?

    VPC (Virtual private cloud)

  • 13

    A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking. Which of the following cloud service provider types should business engage?

    XaaS

  • 14

    A security analyst is receiving numerous alerts reporting that the response time of an internet-facing application has been degraded. However, the internal network performance was not degraded. Which of the following MOST likely explains this behavior?

    DDoS attack

  • 15

    After multiple on-premises security solutions were migrated to the cloud, the incident response time increased. The analysts are spending a long time tracing information on different cloud consoles and correlating data in different formats. Which of the following can be used to optimize the incident response time?

    CASB

  • 16

    Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?

    Transit gateway

  • 17

    A company is considering transitioning to the cloud. The company employs individuals from various locations around the world. The company does not want to increase its on-premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of the company?

    Hybrid environment

  • 18

    Several universities are participating in a collaborative research project and need to share compute and storage resources. Which of the following cloud deployment strategies would BEST meet this need?

    Community

  • 19

    A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately protected from advanced threats and malware. The CSO believes there is a high risk that a data breach could occur in the near future due to the lack of detective and preventive controls. Which of the following should be implemented to BEST address the CSO's concerns? {Select TWO)

    A CASB, An NG-SWG

  • 20

    The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?

    CASB

  • 21

    A company is moving its retail website to a public cloud provider. The company wants to tokenize credit card data but not allow the cloud provider to see the stored credit card information. Which of the following would BEST meet these objectives?

    CASB

  • 22

    Server administrators want to configure a cloud solution so that computing memory and processor usage is maximized most efficiently across a number of virtual servers. They also need to avoid potential denial-of-service situations caused by availability. Which of the following should administrators configure to maximize system availability while efficiently utilizing available computing power?

    Dynamic Resource Allocation

  • 23

    A company reduced the area utilized in its datacenter by creating virtual networking through automation and by creating provisioning routes and rules through scripting. Which of the following does this example describe?

    laC (Infrastructure as Code)

  • 24

    A startup company is using multiple SaaS and IaaS platforms to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?

    CASB (cloud access security broker)

  • 25

    Which of the following distributes data among nodes, making it more difficult to manipulate the data while also minimizing downtime?

    Fog computing

  • 26

    An organization has decided to host its web application and database in the cloud. Which of the following BEST describes the security concerns for this decision?

    The cloud vendor is a new attack vector within the supply chain.

  • 27

    Which of the following is a risk that is specifically associated with hosting applications in the public cloud?

    Shared tenancy

  • 28

    Which of the following cloud models provides clients with servers, storage, and networks but nothing else?

    IaaS

  • 29

    A company has decided to move its operations to the cloud. It wants to utilize technology that will prevent users from downloading company applications for personal use, restrict data that is uploaded, and have visibility into which applications are being used across the company. Which of the following solutions will BEST meet these requirements?

    A CASB

  • 30

    A Chief Executive Officer (CEO) is dissatisfied with the level of service from the company's new service provider. The service provider is preventing the CEO from sending email from a work account to a personal account. Which of the following types of service providers is being used?

    Managed security service provider

  • 31

    Which of the following describes the ability of code to target a hypervisor from inside?

    VM escape

  • 32

    An engineer is setting up a VDI environment for a factory location, and the business wants to deploy a low-cost solution to enable users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?

    Thin clients

  • 33

    A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider. Which of the following should the administrator use?

    MSSP

  • 34

    A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software compatibility issues. The OSs are still supported by the vendor, but the industrial software is no longer supported. The Chief Information Security Officer (CISO) has created a resiliency plan for these systems that will allow OS patches to be installed in a non-production environment, while also creating backups of the systems for recovery. Which of the following resiliency techniques will provide these capabilities?

    Virtual machines

  • 35

    A network administrator is concerned about users being exposed to malicious content when accessing company cloud applications. The administrator wants to be able to block access to sites based on the AUP. (acceptable use policy). The users must also be protected because many of them work from home or at remote locations, providing on-site customer support. Which of the following should the administrator employ to meet these criteria?

    Implement an SWG

  • 36

    To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization?

    SaaS

  • 37

    Following a prolonged datacenter outage that affected web-based sales, a company has decided to move its operations to a private cloud solution. The security team has received the following requirements: • There must be visibility into how teams are using cloud-based services. • The company must be able to identify when data related to payment cards is being sent to the cloud. • Data must be available regardless of the end user's geographic location • Administrators need a single pane-of-glass view into traffic and trends. Which of the following should the security analyst recommend?

    Implement a CASB solution.

  • 38

    A well-known organization has been experiencing attacks from APIs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots. Which of the following is the BEST defense against this scenario?

    Implementing application execution in a sandbox for unknown software.

  • 39

    A SOC is currently being outsourced. Which of the following is being used?

    MSSP

  • 40

    A cloud administrator is configuring five computer instances under the same subnet in a VPC. Three instances are required to communicate with one another, and the other two must be logically isolated from all other instances in the VPC. Which of the following must the administrator configure to meet this requirement?

    Two security groups

  • 41

    An organization has various applications that contain sensitive data hosted in the cloud. The company’s leaders are concerned about lateral movement across applications of different trust levels. Which of the following solutions should the organization implement to address the concern?

    CASB

  • 42

    When planning to build a virtual environment, an administrator need to achieve the following; ● Establish policies in limit who can create new VMs ● Allocate resources according to actual utilization ● Require justification for requests outside of the standard requirements ● Create standardized categories based on size and resource requirements Which of the following is the administrator MOST likely trying to do?

    Avoid VM sprawl

  • 43

    A cloud service provider has created an environment where customers can connect existing local networks to the cloud for additional computing resources and block internal HR applications from reaching the cloud. Which of the following cloud models is being used?

    Hybrid

  • 44

    Hackers recently attacked a company's network and obtained several unfavorable pictures from the Chief Executive Officer's workstation. The hackers are threatening to send the images to the press if a ransom is not paid. Which of the following is impacted the MOST?

    Reputation

  • 45

    A smart retail business has a local store and a newly established and growing online storefront. A recent storm caused a power outage to the business and the local ISP, resulting in several hours of lost sales and delayed order processing. The business owner now needs to ensure two things: * Protection from power outages * Always-available connectivity In case of an outage The owner has decided to implement battery backups for the computer equipment Which of the following would BEST fulfill the owner’s second need?

    Purchase services from a cloud provider for high availability

  • 46

    A Chief Information Security Officer (CISO) wants to implement a new solution that can protect against certain categories of websites, whether the employee is in the office or away. Which of the following solutions should the CISO implement?

    SWG

  • 47

    The Chief Information Security Officer (CISO) has decided to reorganize security staff to concentrate on incident response and to outsource outbound Internet URL categorization and filtering to an outside company. Additionally, the CISO would like this solution to provide the same protections even when a company laptop or mobile device is away from a home office. Which of the following should the CISO choose?

    Next-generation SWG

  • 48

    A healthcare company is revamping its IT strategy in light of recent regulations. The company is concerned about compliance and wants to use a pay-per-use model. Which of the following is the BEST solution?

    Public SaaS

  • 49

    An organization’s help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command: ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an impacted machine, and the issue goes away. Which of the following attacks MOST likely occurred on the original DNS server?

    DNS cache poisoning

  • 50

    Employees are having issues accessing the company's website. Some employees report very slow performance, while others cannot open the website at all. The web and security administrators search the logs and find millions of half-open connections to port 443 on the web server. Further analysis reveals thousands of different source IPs initiating this traffic. Which of the following attacks is MOST likely occurring?

    DDoS

  • 51

    A security analyst is reviewing the following output from a system:Which of the following is MOST likely being observed?

    Denial of service (DoS)

  • 52

    A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?

    MSSP

  • 53

    A grocery store is expressing security and reliability concerns regarding the on-site backup strategy currently being performed by locally attached disks. The main concerns are the physical security of the backup media and the durability of the data stored on these devices. Which of the following is a cost-effective approach to address these concerns?

    Migrate to a cloud backup solution

  • 54

    A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service Unavailable error. The analyst runs a netstat-an command to discover if the web server is up and listening. The analyst receives the following output: TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT Which of the following types of attack is the analyst seeing?

    Denial of service

  • 55

    A security administrator has received multiple calls from the help desk about customers who are unable to access the organization's web server. Upon reviewing the log files, the security administrator determines multiple open requests have been made from multiple IP addresses, which is consuming system resources. Which of the following attack types does this BEST describe?

    DDoS

  • 56

    A web architect would like to move a company's website presence to the cloud. One of the management team's key concerns is resiliency in case a cloud provider's data center or network connection goes down. Which of the following should the web architect consider to address this concern?

    Availability zones

  • 57

    Cloud security engineers are planning to allow and deny access to specific features in order to increase data security. Which of the following cloud features is the most appropriate to ensure access is granted properly?

    Resource policies

  • 58

    A company would like to move to the cloud. The company wants to prioritize control and security over cost and ease of management. Which of the following cloud models would best suit this company's priorities?

    Private

  • 59

    A police department is using the cloud to share information with city officials. Which of the cloud models describes this scenario?

    Community

  • 60

    Which of the following would be best to ensure data is saved to a location on a server, is easily scaled, and is centrally monitored?

    Containers

  • 61

    A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?

    DDoS

  • 62

    Several users have been violating corporate security policy by accessing inappropriate Sites on corporate-issued mobile devices while off campus. The senior leadership team wants all mobile devices to be hardened with controls that: ● Limit the sites that can be accessed ● Only allow access to internal resources while physically on campus. ● Restrict employees from downloading images from company email Which of the following controls would best address this situation? (Select two).

    Content management, Geofencing

  • 63

    An engineer is using scripting to deploy a network in a cloud environment. Which of the following describes this scenario?

    SDN

  • 64

    An analyst is concerned about data leaks and wants to restrict access to internet services to authorized users only. The analyst also wants to control the actions each user can perform on each service. Which of the following would be the best technology for the analyst to consider implementing?

    CASB

  • 65

    A company's legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?

    Geolocation policy

  • 66

    A company has had several malware incidents that have been traced back to users accessing personal SaaS applications on the internet from the company network. The company has a policy that states users can only access business-related cloud applications from within the company network. Which of the following technical solutions should be used to enforce the policy?

    Leverage a cloud access security broker.