[Emerging Technologies and Threats] An organization that performs real -time financial processing is implementing a new backup solution. Given the following business requirements: The backup solution must reduce the risk of potential backup compromise. The backup solution must be resilient to a ransomware attack. The time to restore from backups is less important than backup data integrity. Multiple copies of production data must be maintained. Which of the following backup strategies best meets these requirements?
[Security Engineering and Cryptography] Developers have been creating and managing cryptographic material on their personal laptops fix use in production environment. A security engineer needs to initiate a more secure process. Which of thefollowing is the best strategy for the engineer to use?
[Security Operations] A company migrating to aremote work model requires that company -owned devices connect to a VPN before logging in to the device itself. The VPN gateway requires that a specific key extension is deployed to the machine certificates in the internal PKI. Which of the following best explains this requirement?
[Security Operations] Anorganization has noticed an increase in phishing campaigns utilizingtyposquatting. A security analyst needs to enrich the data for commonly used domains against the domains used in phishing campaigns. The analyst uses a log forwarder to forward network logs to the SIEM. Which of the following would allow the security analyst to perform this analysis?
[Security Operations] An analyst reviews a SIEM and generates the following report: OnlyHOST002is authorized for internet traffic. Which of the following statements is accurate?
[Identity and Access Management (IAM)] A security analyst is reviewing the following authentication logs: Which of thefollowing should the analyst do first?