A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS - protected HTTP sessions from systems that do not send traffic to those sites. The technician will define this threat as:
A security engineer thinks the development team has been hard -coding sensitive environment variables in its code. Which of the following would BEST secure the company’s CI/CD pipeline?
A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively?
A security engineer has been asked to close all non -secure connections from the corporate network. The engineer is attempting to understand why the corporate UTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users are able to download emails correctly by using IMAP instead. The network comprises three VLANs: The security engineer looks at the UTM firewall rules and finds the following: Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network?
A security analyst is reviewing network connectivity on a Linux workstation and examining the active TCP connections using the command line. Which of the following commands would be the BEST to run to view only active Internet connections?
An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission -essential items. Which of the following phases establishes the identification and prioritization of critical systems and functions?