Question 71
A recently issued audit report highlight exception related to end-user handling of sensitive data access and credentials. A security manager is addressing the findings. Which of the following activities should be implemented?
Question 72
External users are reporting that a web application is slow and frequently times out when attempting to submit information. Which of the following software development best practices would have helped prevent this issue?
Question 73
A cybersecurity analyst is completing an organization's vulnerability report and wants it to reflect assets accurately. Which of the following items should be in the report?
Question 74
A security analyst is reviewing IDS logs and notices the following entry:
Which of the following attacks is occurring?
Question 75
A security analyst was asked to join an outage call for a critical web application. The web middleware support team determined the web server is running and having no trouble processing requests; however, some investigation has revealed firewall denies to the web server that began around 1.00 a.m. that morning. An emergency change was made to enable the access, but management has asked for a root cause determination.
Which of the following would be the BEST next step?
