A security engineer wants to reduce the attack surface of a public-facing containerized application. Which of the following will best reduce the application's privilege escalation attack surface?
A security engineer is reviewing the following piece of code for an internally developed web application that allows employees to manipulate documents from a number of internal servers. Users can specify the document to be parsed by passing the document URL to the application as a parameter. The application then executes the following Python call: response = requests.get(url)The engineer wants to improve the security of the application before deployment. Which of the following is the best to implement?
A security engineer wants to enhance the security posture of end-user systems in a zero trust environment. Given the following requirements:• Reduce the ability for potentially compromised endpoints to contact C2 infrastructure.• Track the requests that the malware makes to the IPs.• Avoid the download of additional payloads.Which of the following should the engineer deploy to meet these requirements?
A company plans to implement a research facility with intellectual property data that should be protected. The following is the security diagram proposed by the security architect:Which of the following security architect models is illustrated by the diagram?
Which of the following is the main reason quantum computing advancements are leading companies and countries to deploy new encryption algorithms?
A vulnerability scan on a web server identified the following:Which of the following actions would most likely eliminate on-path decryption attacks? (Choose two.)