During a security assessment, an organization is advised of inadequate control over network segmentation. The assessor explains that the organization's reliance on VLANs to segment traffic is insufficient to provide segmentation based on regulatory standards. Which of the following should the organization consider implementing along with VLANs to provide a greater level of segmentation?
A security administrator was informed that a server unexpectedly rebooted. The administrator received an export of syslog entries for analysis:Which of the following does the log sample indicate? (Choose two.)
An organization has employed the services of an auditing firm to perform a gap assessment in preparation for an upcoming audit. As part of the gap assessment, the auditor supporting the assessment recommends the organization engage with other industry partners to share information about emerging attacks to organizations in the industry in which the organization functions. Which of the following types of information could be drawn from such participation?
A recent penetration test identified that a web server has a major vulnerability. The web server hosts a critical shipping application for the company and requires99.99% availability. Attempts to fix the vulnerability would likely break the application. The shipping application is due to be replaced in the next three months.Which of the following would BEST secure the web server until the replacement web server is ready?
To prepare for an upcoming audit, the Chief Information Security Officer (CISO) asks for all 1200 vulnerabilities on production servers to be remediated. The security engineer must determine which vulnerabilities represent real threats that can be exploited so resources can be prioritized to migrate the most dangerous risks. The CISO wants the security engineer to act in the same manner as would an external threat, while using vulnerability scan results to prioritize any actions.Which of the following approaches is described?
DRAG DROP -Drag and drop the cloud deployment model to the associated use-case scenario. Options may be used only once or not at all.Select and Place: