Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?
Answer(s): D
https://searchsecurity.techtarget.com/definition/cryptanalysis
A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company's services to ensure false positives do not drop legitimate traffic.Which of the following would satisfy the requirement?
Answer(s): A
https://subscription.packtpub.com/book/networking-and-servers/9781782174905/5/ch05lvl1sec38/differentiating-between-nids-and-nips
A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services.Which of the following should be modified to prevent the issue from reoccurring?
https://www.nakivo.com/blog/disaster-recovery-in-cloud-computing/
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped.The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.The technician will define this threat as:
Answer(s): C
https://www.internetsociety.org/deploy360/tls/basics/
A security engineer thinks the development team has been hard-coding sensitive environment variables in its code.Which of the following would BEST secure the company's CI/CD pipeline?
https://about.gitlab.com/blog/2021/04/09/demystifying-ci-cd-variables/
Post your Comments and Discuss CompTIA CAS-004 exam dumps with other Community members: