<< Prev Question Next Question >>

Question 11/35

An organization is using a PKI management server and a SOAR platform to manage the certificate lifecycle. The SOAR platform queries a certificate management tool to check all endpoints for SSL certificates that have either expired or are nearing expiration. Engineers are struggling to manage problematic certificates outside of PKI management since deploying certificates and tracking them requires searching server owners manually. Which action will improve workflow automation?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (35q)
Question 1: Refer to the exhibit. (Exhibit) Which asset has the highest ...
Question 2: Drag and drop the mitigation steps from the left onto the vu...
Question 3: Which command does an engineer use to set read/write/execute...
Question 4: An engineer has created a bash script to automate a complica...
Question 5: What is a benefit of key risk indicators?...
Question 6: Refer to the exhibit. (Exhibit) An engineer is analyzing thi...
Question 7: Refer to the exhibit. (Exhibit) Where does it signify that a...
Question 8: An API developer is improving an application code to prevent...
Question 9: A threat actor attacked an organization's Active Directory s...
Question 10: Refer to the exhibit. (Exhibit) Which command was executed i...
Question 11: An organization is using a PKI management server and a SOAR ...
Question 12: An employee abused PowerShell commands and script interprete...
Question 13: An analyst is alerted for a malicious file hash. After analy...
Question 14: An engineer is analyzing a possible compromise that happened...
Question 15: A threat actor used a phishing email to deliver a file with ...
Question 16: What is a limitation of cyber security risk insurance?...
Question 17: Refer to the exhibit. (Exhibit) An employee is a victim of a...
Question 18: A threat actor has crafted and sent a spear-phishing email w...
Question 19: An engineer is moving data from NAS servers in different dep...
Question 20: A malware outbreak is detected by the SIEM and is confirmed ...
Question 21: An engineer is utilizing interactive behavior analysis to te...
Question 22: Drag and drop the actions below the image onto the boxes in ...
Question 23: Drag and drop the phases to evaluate the security posture of...
Question 24: Refer to the exhibit. (Exhibit) Cisco Advanced Malware Prote...
Question 25: Refer to the exhibit. (Exhibit) What is occurring in this pa...
Question 26: Drag and drop the cloud computing service descriptions from ...
Question 27: An organization had a breach due to a phishing attack. An en...
Question 28: A security expert is investigating a breach that resulted in...
Question 29: An engineer is investigating several cases of increased inco...
Question 30: An engineer notices that unauthorized software was installed...
Question 31: How does Wireshark decrypt TLS network traffic?...
Question 32: An employee who often travels abroad logs in from a first-se...
Question 33: An engineer implemented a SOAR workflow to detect and respon...
Question 34: Refer to the exhibit. (Exhibit) Which two steps mitigate att...
Question 35: Refer to the exhibit. (Exhibit) An engineer is reverse engin...