- (Exam Topic 2)
Which of the following secure coding techniques can be used to prevent cross-site request forgery attacks?
Correct Answer:
D
- (Exam Topic 2)
A company's security administrator needs to automate several security processes related to testing for the existence of changes within the environment Conditionally other processes will need to be created based on input from prior processes
Which of the following is the BEST method for accomplishing this task?
Correct Answer:
C
- (Exam Topic 3)
A security officer needs lo find Ihe mosl cos!-effective solution lo the cunent data pnvacy and protection gap found in the last security assessment Which of the following is the BEST recommendation?
Correct Answer:
A
- (Exam Topic 2)
Employees of a large financial company are continuously being Infected by strands of malware that are not
detected by EDR tools. When of the following Is the BEST security control to implement to reduce corporate risk while allowing employees to exchange files at client sites?
Correct Answer:
C
- (Exam Topic 2)
A security analyst inspects the header of an email that is presumed to be malicious and sees the following:
Which of the following is inconsistent with the rest of the header and should be treated as suspicious?
Correct Answer:
C