Question 6 of 61

Which of the following security features do email signatures provide?

    Correct Answer: A

Question 7 of 61

A software development company wants to ensure that users can confirm the software is legitimate when installing it. Which of the following is the best way for the company to achieve this security objective?

    Correct Answer: A

Question 8 of 61

While performing mandatory monthly patch updates on a production application server, the security analyst reports an instance of buffer overflow for a new application that was migrated to the cloud and is also publicly exposed. Security policy requires that only internal users have access to the application. Which of the following should the analyst implement to mitigate the issues reported? (Choose two.)

    Correct Answer: A, B

Question 9 of 61

PKI can be used to support security requirements in the change management process. Which of the following capabilities does PKI provide for messages?

    Correct Answer: A

Question 10 of 61

Several unlabeled documents in a cloud document repository contain cardholder information. Which of the following configuration changes should be made to the DLP system to correctly label these documents in the future?

    Correct Answer: C