A security engineer added a new server to the company email cluster. The server has a new external IP address associated with it. After a few days, the service desk started receiving complaints from users about their outgoing messages to customers being flagged as spam. Which of the following records should the security engineer update to fix the issue? (Choose two.)
Due to an infrastructure optimization plan, a company has moved from a unified architecture to a federated architecture divided by region. Long-term employees now have a better experience, but new employees are experiencing major performance issues when traveling between regions. The company is reviewing the following information:Which of the following is the most effective action to remediate the issue?
Which of the following best explains why AI output could be inaccurate?
A company discovers intellectual property data on commonly known collaboration web applications that allow the use of slide templates. The systems administrator is reviewing the configurations of each tool to determine how to prevent this issue. The following security solutions are deployed:• CASB• SASE• WAF• EDR• Firewall• IDS• SIEM• DLP endpointsWhich of the following should the administrator do to address the issue?
A security audit of a company's application finds that customer account passwords are manually set and never expire. The company wants to fix the password issue on a minimal budget within 30 days while minimizing the impact to customers. Which of the following should the company do?
A company plans to implement a research facility with intellectual property data that should be protected. The following is the security diagram proposed by the security architect:Which of the following security architect models is illustrated by the diagram?