Q1. Which of the following is the security engineer most likely doing?
A.Assessing log in activities using geolocation to tune impossible Travel rate alerts
B. Reporting on remote log-in activities to track team metrics
C. Threat hunting for suspicious activity from an insider threat
D. Baselining user behavior to support advanced analytics
Correct Answer: A
Q2. An organization wants to manage specialized endpoints and needs a solution that provides the ability to * Centrally manage configurations * Push policies. * Remotely wipe devices * Maintain asset inventory Which of the following should the organization do to best meet these requirements?
A.Use a configuration management database
B. Implement a mobile device management solution.
C. Configure contextual policy management
D. Deploy a software asset manager
Correct Answer: B
Q3. An organization is implementing Zero Trust architecture A systems administrator must increase the effectiveness of the organization's context-aware access system. Which of the following is the best way to improve the effectiveness of the system?
A.Secure zone architecture
B. Always-on VPN
C. Accurate asset inventory
D. Microsegmentation
Correct Answer: D
$ 39
Reviews
There are no reviews yet.