SE
Certmaster CE
R
Security+ Domain
U
N
1.0 General
L
Security Concepts
EA
Assessment
ID
, SE
R
U
N
L
EA
In a cybersecurity operation where downtime is critical to its mission, a cybersecurity analyst
incorporates allowlists and denylists restrictions. The objective is to guarantee high availability
(HA) and safeguard against potential security threats. How would a cybersecurity analyst utilize
these lists in this scenario? (Select the two best options.) - ANSA. Allowlists can specify
approved software, hardware, and change types that are essential for the operation's
functioning.
ID
D. Denylists can block unauthorized software, hardware, and change types that pose high risk
to the operation's availability and security.
How can a cybersecurity analyst effectively utilize version control to maintain a historical record
of changes and ensure security in the organization's IT systems and applications? - ANSC.
Use version control to track changes in network diagrams and configuration files.
A malicious actor initiates an attack on a software organization, believing it to have successfully
acquired sensitive data. Unbeknownst to the attacker, the organization has deceived the
attacker by intentionally providing fake sensitive information and has now captured the