SIMULATION-A security analyst is creating the first draft of a network diagram for the company’s new customer-facing payment application that will be hosted by a third-party cloud service provider.INSTRUCTIONS-Click the ? to select the appropriate icons to create a secure, redundant web application. Then use the dropdown menu to select the appropriate subnet type. Every space in the diagram must be filled.If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A program manager wants to ensure contract employees can only access the company's computers Monday through Friday from 9 a m. to 5 p.m. Which of the following would best enforce this access control?
Which of the following would an organization most likely use to minimize the loss of data on a file server in the event data needs to be restored?
A site reliability engineer is designing a recovery strategy that requires quick failover to an identical site if the primary facility goes down. Which of the following types of sites should the engineer consider?
Which of the following should an organization use to ensure that it can review the controls and performance of a service provider or vendor?
Which of the following is the first step to secure a newly deployed server?