[Security Architecture] Users are willing passwords on paper because of the number of passwords needed in an environment. Which of the following solutions is the best way to manage this situation and decrease risks?
[Governance, Risk, and Compliance (GRC)] During a periodic internal audit, a company identifies a few new, critical security controls that are missing. The company has a mature risk management program in place, and the following requirements must be met: The stakeholders should be able to see all the risks. The risks need to have someone accountable for them. Which of the following actions should the GRC analyst take next?
[Emerging Technologies and Threats] Which of the following best explains the business requirement a healthcare provider fulfills by encrypting patient data at rest?
[Security Architecture] A company was recently infected by malware. During the root cause analysis, the company determined that several users were installing their own applications. To prevent further compromises, the company has decided it will onlyallow authorized applications to run on its systems. Which of the following should the company implement?
[Security Architecture] An organization is developing a disaster recovery plan that requires data to be backed up and available at a moment's notice. Which of the following should the organization consider first to address this requirement?
[Identity and Access Management (IAM)] A security analyst is reviewing the following authentication logs: Which of thefollowing should the analyst do first?