(Questions and Correct Answers) 100% Verified
1. The security team recently enabled public access to a web application hosted
on a server inside the corporate network. The developers of the appli- cation
report that the server has received several structured query language (SQL)
injection attacks in the past several days. The team needs to deploy a solution
that will block the SQL injection attacks. Which solution fulfills these
requirements?: Web application firewall (WAF)
2. An IT security team has been notified that external contractors are using
their personal laptops to gain access to the corporate network. The team
needs to recommend a solution that will prevent unapproved devices from
accessing the network. Which solution fulfills these requirements?: Imple-
menting port security
3. The chief technology officer for a small publishing company has been tasked
with improving the company's security posture. As part of a network upgrade,
the company has decided to implement intrusion detection, spam filtering,
content filtering, and antivirus controls. The project needs to be completed
1/
23
,using the least amount of infrastructure while meeting all require- ments. Which
solution fulfills these requirements?: Deploying a unified threat management
(UTM) appliance
4. The security team plans to deploy an intrusion detection system (IDS)
solution to alert engineers about inbound threats. The team already has a
database of signatures that they want the IDS solution to validate. Which
detection technique meets the requirements?: Signature-based detection
5. An IT organization had a security breach after deploying an update to its
production web servers. The application currently goes through a manual
update process a few times per year. The security team needs to recommend a
failback option for future deployments. Which solution fulfills these require-
ments?: Implementing versioning
6. A software development team is working on a new mobile application that will
be used by customers. The security team must ensure that builds of the
application will be trusted by a variety of mobile devices.Which solution fulfills
these requirements?: Code signing
7. An IT organization recently suffered a data leak incident. Management has
asked the security team to implement a print blocking mechanism for all
2/
23
, documents stored on a corporate file share. Which solution fulfills these
requirements?: Digital rights management (DRM)
8. A company has recently discovered that a competitor is distributing copy-
righted videos produced by the in-house marketing team. Management has
asked the security team to prevent these types of violations in the future. Which
solution fulfills these requirements?: Digital rights management (DRM)
3/
23