[Emerging Technologies and Threats] A Chief Information Security Officer is concerned about the operational impact of ransomware. In the event of a ransomware attack, the business requires the integrity of the data to remain intact and an RPO of less than one hour. Which of the following storage strategies best satisfies the business requirements?
[Security Engineering and Cryptography] Previously intercepted communications must remain secure even if a current encryption key is compromised in the future. Which of the following best supports this requirement?
[Governance, Risk, and Compliance (GRC)] A security engineer is assisting a DevOps team that has the following requirements for container images: Ensure container images are hashed and use version controls. Ensure container images are up to date and scanned for vulnerabilities. Which of the following should the security engineer do to meet these requirements?
[Security Assessments and Testing] During a vulnerability assessment, a scan reveals the following finding: Windows Server 2016 Missing hotfix KB87728 - CVSS 3.1 Score: 8.1 [High] - Affected host 172.16.15.2 Later in the review process, the remediation team marks the finding as a false positive. Which of the following is the best way toavoid this issue on future scans?
[Emerging Technologies and Threats] After a company discovered a zero -day vulnerability in its VPN solution, the company plans to deploy cloud -hosted resources to replace its current on -premises systems. An engineer must find an appropriate solution to facilitate trusted connectivity. Which of the following capabilities is the most relevant?
[Emerging Technologies and Threats] Employees use their badges to track the number of hours they work. The badge readers cannot be upgraded due to facility constraints. The software for the badge readers uses a legacy platform and requires connectivity to the enterprise resource planning solution. Which of the following is the best to ensure the security of the badge readers?