[Security Architecture] A company is preparing to move a new version of a web application to production. No issues were reported during security scanning or quality assurance in the CI/CD pipeline. Which of the following actions should thecompany take next?
[Security Architecture] Which of the following best describes the reason PQC preparation is important?
[Security Architecture] A security team determines that the most significant risks within the pipeline are: • Unauthorized code changes • The current inability to perform independent verification of software modules Which of the following best addresses these concerns?
[Security Architecture] A pharmaceutical lab hired a consultant to identify potential risks associated with Building 2, a new facility that is under construction. The consultant received the IT project plan, which includes the following VLAN design: Which of the following TTPs should the consultant recommend be addressed first?
[Security Architecture] An organization plans to deploy new software. The project manager compiles a list of roles that will be involved in different phases of the deployment life cycle. Which of the following should the project manager use to track these roles?
[Identity and Access Management (IAM)] A security analyst is reviewing the following authentication logs: Which of thefollowing should the analyst do first?