An organization's IT department is transitioning from an on-premise server system to a cloud platform. Evaluating the security concepts tied to this transformation, what security design paradigm requires any request to be authenticated before being allowed onto the system?
A. Deperimeterization
B. Zero trust
C. SD-WAN
D. SASE
Explanation:
Zero trust is a security paradigm that requires all requests, both inside and outside the organization's network, to be authenticated, authorized, and continuously validated before being allowed access to systems or data. This approach assumes no implicit trust and requires verification for every action or request, regardless of where it originates.
An organization disabled unneeded services and placed a firewall in front of a business-critical legacy system. Which of the following best describes the actions taken by the organization?
A. Exception
B. Segmentation
C. Risk transfer
D. Compensating controls
A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. Which of the following data classifications should be used to secure patient data?
A. Private
B. Critical
C. Sensitive
D. Public
A digital forensic analyst at a healthcare company investigates a case involving a recent data breach. In evaluating the available data sources to assist in the investigation, what application protocol and event-logging format enables different appliances and software applications to transmit logs or event records to a central server?
A. Dashboard
B. Endpoint log
C. Application Log
D. Syslog
A leading healthcare provider must improve its network infrastructure to secure sensitive patient data. You are evaluating a Next-Generation Firewall (NGFW), which will play a key role in protecting the network from attack. What feature of a Next-Generation Firewall (NGFW) will help protect sensitive patient data in the healthcare organization's network?
A. High Availability (HA) modes
B. Bandwidth management
C. Application - level inspection
D. Virtual Private Network (VPN) support
Page 3 out of 78 Pages |
Previous |