During a vulnerability assessment, several end-of-life operating systems were discovered within the environment. Which action should be taken to resolve the issue?
Which method is frequently used to protect software?
The development team has requested permission to use several open-source libraries to build a corporate web application.
Which resource can the security team recommend to ensure these libraries can be trusted?
An organization is experiencing multiple instances of attempted access from geographical locations where there are no corporate offices or staff.
What should a network administrator do to prevent further access attempts?
Which characteristic identifies intranet application software?
Which security technique should be used to prevent data exfiltration?
An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.
Which type of encryption will meet the needs of the organization?
An IT team has been tasked with improving an organization's security posture to defend against potential malicious actors.
What is the first step when hunting for potential threats?
Which type of communications media uses light waves to transmit data?
An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services.
Which protocol will offer the most reliable and secure method for data transport?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
WGU Free Exams |
---|
![]() |