A security team receives an escalated support ticket for a user who is unable to access specific corporate resources. The following configurations exist in the corporation:• A device certificate is deployed on all corporate assets.• Templates for unique user certificates are configured.• Security updates are installed every 30 days.• Administrator access is tied to specific hosts.The ticket contains the following observations:• The user has been on leave for more than 90 days.• Internal vulnerability scans indicate no device issues.• Single sign-on works as expected.• Privileged systems are not accessible.Which of the following best describes the root cause?
A web application server that provides services to hybrid modern and legacy financial applications recently underwent a scheduled upgrade to update common libraries, including OpenSSL. Multiple users are now reporting failed connection attempts to the server. The technician performing initial triage identified the following:• Client applications more than five years old appear to be the most affected.• Web server logs show initial connection attempts by affected hosts.• For the failed connections, logs indicate "cipher unavailable."Which of the following is most likely to safely remediate this situation?
A cloud engineer configured mail security protocols to support email authenticity and wants to enable the flow of email security information to a third-party platform for further analysis. Which of the following must be configured correctly?
A company is concerned about the security of customer data. The IT department has configured all web applications with appropriate access controls to restrict to only authorized users. Which of the following solutions addresses this concern?
A company must manage the remediation of several vulnerabilities. To do so, a security engineer assesses how software is used in the organization and finds the following:Which of the following vulnerabilities should the security engineer remediate first?
An organization determined its preparedness for a ransomware attack is inadequate. A security administrator is working on ways to improve and monitor the organization's response to ransomware attacks. Which of the following is the best action for the administrator to take?