[Emerging Technologies and Threats] A security engineer wants to propose an MDM solution to mitigate certain risks. The MDM solution should meet the following requirements: • Mobile devices should be disabled if they leave the trusted zone. • If the mobile device is lost, data is not accessible. Which of the following options should the security engineer enable on the MDM solution? (Select two).
[Security Architecture] Which of the following security risks should be considered as an organization reduces cost and increases availability of services by adopting serverless computing?
[Security Architecture] An attacker infiltrated the code base of a hardware manufacturer and inserted malware before the code was compiled. The malicious code is now running at the hardware level across a number of industries and sectors. Which of the following categories best describes this type of vendor risk?
[Emerging Technologies and Threats] A security team is responding to malicious activity and needs to determine the scope of impact the malicious activity appears to affect certain version of an application used by the organization Which of the following actions best enables the team to determine the scope of Impact?
[Security Architecture] An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key. Which of the following would best secure the REST API connection to the database while preventing the use of a hard -coded string in the request string?
[Governance, Risk, and Compliance (GRC)] A recent security audit identified multiple endpoints have the following vulnerabilities: • Various unsecured open ports • Active accounts for terminated personnel • Endpoint protection software with legacy versions • Overly permissive access rules Which of the following would best mitigate these risks? (Select three).