[Emerging Technologies and Threats] A security architect for a global organization with a distributed workforce recently received funding lo deploy a CASB solution Which of the following most likely explains the choice to use a proxy -based CASB?
[Governance, Risk, and Compliance (GRC)] A company's security policy states that any publicly available server must be patched within 12 hours after a patch is released A recent llS zero -day vulnerability was discovered that affects all versions of the Windows Server OS: Which of the following hosts should a security analyst patch first once a patch is available?
[Security Architecture] A security review revealed that not all of the client proxy traffic is being captured. Which of the following architectural changes best enables the capture of traffic for analysis?
[Security Architecture] A company is having issues with its vulnerability management program New devices/lPs are added and dropped regularly, making the vulnerability report inconsistent Which of the following actions should the company lake to most likely improve the vulnerability management process'
[Security Architecture] A security analyst Detected unusual network traffic related to program updating processes The analyst collected artifacts from compromised user workstations. The discovered artifacts were binary files with the same name as existing, valid binaries but. with different hashes which of the following solutions would most likely prevent this situation from reoccurring?
[Identity and Access Management (IAM)] A security analyst is reviewing the following authentication logs: Which of thefollowing should the analyst do first?