While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website. Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?
Which of the following is the best way to validate the integrity and availability of a disaster recovery site?
Which of the following is the most effective way to protect an application server running software that is no longer supported from network threats?
An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.
Which of the following best describes the user’s activity?