A customer calls a technician and needs to remotely connect to a web server to change some code manually. The technician needs to configure the user's machine with protocols to connect to the Unix web server, which is behind a firewall. Which of the following protocols does the technician MOST likely need to configure?
A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an initial investigation, it was discovered that email is being exfiltrated through an active connection.Which of the following is the NEXT step the team should take?
A security engineer wants to add SSL to the public web server. Which of the following would be the FIRST step to implement the SSL certificate?
Which of the following development models entails several iterative and incremental software development methodologies such as Scrum?
Which of the following types of penetration test will allow the tester to have access only to password hashes prior to the penetration test?
A small- to medium-sized company wants to block the use of USB devices on its network. Which of the following is the MOST cost-effective way for the security analyst to prevent this?