[Security Architecture] A security engineer is reviewing the following vulnerability scan report: Which of the following should the engineer prioritize for remediation?
[Security Architecture] A malware researcher has discovered a credential stealer is looking at a specific memory register to harvest passwords that will be used later for lateral movement in corporate networks. The malware is using TCP 4444 to communicate with other workstations. The lateral movement would be best mitigated by:
[Governance, Risk, and Compliance (GRC)] Company A acquired Company B. During an audit, a security engineer found Company B's environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A's security program. Which of the following risk-handling techniques was used?
[Emerging Technologies and Threats] Which of the following AI concerns is most adequately addressed by input sanitation?
[Security Architecture] A security configure isbuilding a solution to disable weak CBC configuration for remote access connections lo Linux systems. Which of the following should the security engineer modify?
[Security Architecture] An organization recently implemented a purchasing freeze that has impacted endpoint life -cycle management efforts. Which of the following should a security manager do to reduce risk without replacing the endpoints?