To secure an application after a large data breach, an e-commerce site will be resetting all users’ credentials. Which of the following will BEST ensure the site’s users are not compromised after the reset?
Correct Answer:C
A systems administrator needs to install the same X.509 certificate on multiple servers. Which of the following should the administrator use?
Correct Answer:B
Which of the following scenarios BEST describes a risk reduction technique?
Correct Answer:B
An attacker is exploiting a vulnerability that does not have a patch available. Which of the following is the attacker exploiting?
Correct Answer:A
An.. that has a large number of mobile devices is exploring enhanced security controls to manage unauthorized access if a device is lost or stolen. Specifically, if mobile devices are more
than 3mi (4 8km) from the building, the management team would like to have the security team alerted and server resources restricted on those devices. Which of the following controls should the
organization implement?
Correct Answer:A