Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?
A systems administrator is redesigning now devices will perform network authentication. The following requirements need to be met:
• An existing Internal certificate must be used.
• Wired and wireless networks must be supported
• Any unapproved device should be Isolated in a quarantine subnet
• Approved devices should be updated before accessing resources
Which of the following would best meet the requirements?
Which of the following describes a security alerting and monitoring tool that collects system, application, and network logs from multiple sources in a centralized system?
Which of the following is the most relevant reason a DPO would develop a data inventory?
Which of the following activities should a systems administrator perform to quarantine a potentially infected system?
Which of the following definitions best describes the concept of log co-relation?
An analyst is reviewing an incident in which a user clicked on a link in a phishing email. Which of the following log sources would the analyst utilize to determine whether the connection was successful?
Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?
Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?