[Security Architecture] A security configure isbuilding a solution to disable weak CBC configuration for remote access connections lo Linux systems. Which of the following should the security engineer modify?
[Emerging Technologies and Threats] A security team is responding to malicious activity and needs to determine the scope of impact the malicious activity appears to affect certain version of an application used by the organization Which of the following actions best enables the team to determine the scope of Impact?
[Security Architecture] A software development team requires valid data for internal tests. Company regulations, however do not allow the use of this data in cleartext. Which of the following solutions best meet these requirements?
[Emerging Technologies and Threats] An organization is developing on Al -enabled digital worker to help employees complete common tasks such as template development, editing, research, and scheduling. As part of the Al workload the organization wants to Implement guardrails within the platform. Which of the following should the company do to secure the Al environment?
[Governance, Risk, and Compliance (GRC)] A hospital provides tablets to its medical staff to enable them to more quickly access and edit patients' charts. The hospital wants to ensure that if a tablet is identified as lost or stolen and a remote command is issued, the risk of data loss can be mitigated within seconds. The tablets are configured as follows: • Full disk encryption is enabled. • "Always On" corporate VPN is enabled. • eFuse -backed keystore is enabled. • Wi-Fi 6 is configured with SAE. • Location services is disabled. • Application allow list is unconfigured. Assuming the hospital policy cannot be changed, which of the following is the best way to meet the hospital's objective?
[Identity and Access Management (IAM)] A security analyst is reviewing the following authentication logs: Which of thefollowing should the analyst do first?