A security analyst notices a number of SIEM events that show the following activity:Which of the following response actions should the analyst take FIRST?
A company has hired a third party to develop software as part of its strategy to be quicker to market. The company's policy outlines the following requirements:✑ The credentials used to publish production software to the container registry should be stored in a secure location.✑ Access should be restricted to the pipeline service account, without the ability for the third-party developer to read the credentials directly.Which of the following would be the BEST recommendation for storing and monitoring access to these shared credentials?
A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals.Which of the following does the business's IT manager need to consider?
A company publishes several APIs for customers and is required to use keys to segregate customer data sets.Which of the following would be BEST to use to store customer keys?
An organization wants to perform a scan of all its systems against best practice security configurations.Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for full automation? (Choose two.)
An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items.Which of the following phases establishes the identification and prioritization of critical systems and functions?