MultipleChoice
A company SIEM collects information about the log sources. Given the following report information:

Which option best actions should a security engineer take to enhance the security monitoring posture?
OptionsMultipleChoice
[Governance, Risk, and Compliance (GRC)]
A systems administrator wants to introduce a newly released feature for an internal application. The administrate docs not want to test the feature in the production environment. Which of the following locations is the best place to test the new feature?
OptionsMultipleChoice
[Identity and Access Management (IAM)]
A security analyst is reviewing the following authentication logs:

Which of thefollowing should the analyst do first?
OptionsMultipleChoice
[Emerging Technologies and Threats]
Which of the following AI concerns is most adequately addressed by input sanitation?
OptionsMultipleChoice
A company is migrating from a Windows Server to Linux-based servers. A security engineer must deploy a configuration management solution that maintains security software across all the Linux servers. Which of the following configuration file snippets is the most appropriate to use?
A.
---
- name: deployment
hosts: linux_servers
remote_user: root
tasks:
- name: Install security software
ansible.builtin.apt:
B.
<hosts>linux_servers</hosts>
<os_type>Linux 3.1</os_type>
<SElinux>true</SElinux>
<source>com.canonical.io</source>
C.
{'name':'deployment',
'hosts':'linux_servers',
'remote_user':'Administrator',
'tasks':{'name':'Install security software',
'com.microsoft.store.latest'}
}
D.
{'task':'install',
'hosts':'linux_servers',
'remote_user':'root',
'se_linux':'false',
'application':'AppX'}
OptionsMultipleChoice
A security analyst is reviewing the following authentication logs:

Which of the following should the analyst do first?
OptionsMultipleChoice
Which of the following AI concerns is most adequately addressed by input sanitation?
OptionsMultipleChoice
The security team is looking into aggressive bot behavior that is resulting in performance issues on the web server. After further investigation, the security engineer determines that the bot traffic is legitimate. Which of the following is the best course of action to reduce performance issues without allocating additional resources to the server?
Options