[Governance, Risk, and Compliance (GRC)] A company wants to install a three -tier approach to separate the web. database, and application servers A security administrator must harden the environment which of the following is the best solution?
[Security Architecture] A security architect wants to develop abaseline of security configurations These configurations automatically will be utilized machine is created Which of the following technologies should the security architect deploy to accomplish this goal?
[Emerging Technologies and Threats] A company updates itscloud -based services by saving infrastructure code in a remote repository. The code is automatically deployed into the development environment every time the code is saved lo the repository The developers express concern that the deployment often fails, citing minor code issues and occasional security control check failures in the development environment Which of the following should a security engineer recommend to reduce the deployment failures? (Select two).
[Emerging Technologies and Threats] A financial technology firm works collaboratively with business partners in the industry to share threat intelligence within a central platform This collaboration gives partner organizations the ability to obtain and share data associated with emerging threats from a variety of adversaries Which of the following should the organization most likely leverage to facilitate this activity? (Select two).
[Emerging Technologies and Threats] An organization mat performs real -time financial processing is implementing a new backup solution Given the following business requirements? * The backup solution must reduce the risk for potential backup compromise * The backup solution must be resilient to a ransomware attack. * The time to restore from backups is less important than the backup data integrity * Multiple copies of production data must be maintained Which of the following backup strategies best meets these requirement?
[Identity and Access Management (IAM)] A security analyst is reviewing the following authentication logs: Which of thefollowing should the analyst do first?