Question 6 of 495

A company is preparing to deploy a global service.

Which of the following must the company do to ensure GDPR compliance? (Choose two.)

    Correct Answer: A, C

    AC

    Reference:

    https://gdpr.eu/compliance-checklist-us-companies/

Question 7 of 495

A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application.

Which of the following is the MOST likely cause?

    Correct Answer: B

    B

    Reference:

    https://aws.amazon.com/premiumsupport/knowledge-center/waf-block-http-requests-no-user-agent/

Question 8 of 495

A security analyst is reviewing the following output:

Which of the following would BEST mitigate this type of attack?

    Correct Answer: B

    The output indicates an attempt to access a sensitive file, such as "/etc/password", using a directory traversal attack. This attack type exploits insufficient validation of user-supplied input, specifically crafted URLs that access directories other than the intended one. Placing a Web Application Firewall (WAF) inline is the best mitigation strategy for such attacks. A WAF can inspect and filter HTTP traffic, blocking malicious requests aimed at exploiting vulnerabilities in the web application, thus protecting against directory traversal attacks.

Question 9 of 495

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?

    Correct Answer: B

    Key distribution involves the process of securely delivering cryptographic keys to their intended recipients, such as a CASB or third-party entity. This ensures that the recipients can access the keys for encryption and decryption purposes. The term focuses on the act of delivering the keys rather than storing or recovering them.

Question 10 of 495

An organization is implementing a new identity and access management architecture with the following objectives:

✑ Supporting MFA against on-premises infrastructure

✑ Improving the user experience by integrating with SaaS applications

✑ Applying risk-based policies based on location

✑ Performing just-in-time provisioning

Which of the following authentication protocols should the organization implement to support these requirements?

    Correct Answer: C

    D

    Reference:

    https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/migrate-application-authentication-to-azure-active-directory