<< Prev Question Next Question >>

Question 23/79

A development team created a mobile application that contacts a company's back-end APIs housed in a PaaS environment. The APIs have been experiencing high processor utilization due to scraping activities. The security engineer needs to recommend a solution that will prevent and remedy the behavior.
Which of the following would BEST safeguard the APIs? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (79q)
Question 1: A company's finance department acquired a new payment system...
Question 2: A security engineer needs to recommend a solution that will ...
Question 3: A vulnerability assessment endpoint generated a report of th...
Question 4: A small business would like to provide guests who are using ...
Question 5: Immediately following the report of a potential breach, a se...
Question 6: A security analyst is investigating a possible buffer overfl...
Question 7: An organization requires a legacy system to incorporate refe...
Question 8: A company processes data subject to NDAs with partners that ...
Question 9: A security architect works for a manufacturing organization ...
Question 10: A pharmaceutical company recently experienced a security bre...
Question 11: A company's Chief Information Officer wants to Implement IDS...
Question 12: All staff at a company have started working remotely due to ...
Question 13: A business wants to migrate its workloads from an exclusivel...
Question 14: A company's claims processed department has a mobile workfor...
Question 15: An application server was recently upgraded to prefer TLS 1....
Question 16: A company's product site recently had failed API calls, resu...
Question 17: A company's employees are not permitted to access company sy...
Question 18: The OS on several servers crashed around the same time for a...
Question 19: A Chief information Security Officer (CISO) is developing co...
Question 20: A security engineer was auditing an organization's current s...
Question 21: A security analyst has noticed a steady increase in the numb...
Question 22: Technicians have determined that the current server hardware...
Question 23: A development team created a mobile application that contact...
Question 24: A software house is developing a new application. The applic...
Question 25: A security analyst is investigating a series of suspicious e...
Question 26: A threat hunting team receives a report about possible APT a...
Question 27: A company launched a new service and created a landing page ...
Question 28: A security architect is implementing a web application that ...
Question 29: A company wants to quantify and communicate the effectivenes...
Question 30: A security engineer needs 10 implement a CASB to secure empl...
Question 31: A small business requires a low-cost approach to theft detec...
Question 32: A business stores personal client data of individuals residi...
Question 33: An attack team performed a penetration test on a new smart c...
Question 34: In preparation for the holiday season, a company redesigned ...
Question 35: A company has hired a security architect to address several ...
Question 36: After a security incident, a network security engineer disco...
Question 37: A company requires a task to be carried by more than one per...
Question 38: An organization is planning for disaster recovery and contin...
Question 39: A company created an external application for its customers....
Question 40: A security analyst is reviewing the following vulnerability ...
Question 41: A security engineer at a company is designing a system to mi...
Question 42: A satellite communications ISP frequently experiences outage...
Question 43: A technician is reviewing the logs and notices a large numbe...
Question 44: A systems administrator is preparing to run a vulnerability ...
Question 45: Company A acquired Company B. During an audit, a security en...
Question 46: An organization is developing a disaster recovery plan that ...
Question 47: A company's product site recently had failed API calls, resu...
Question 48: The Chief information Officer (CIO) wants to establish a non...
Question 49: Which of the following is a benefit of using steganalysis te...
Question 50: Due to adverse events, a medium-sized corporation suffered a...
Question 51: A home automation company just purchased and installed tools...
Question 52: A cybersecurity analyst discovered a private key that could ...
Question 53: An energy company is required to report the average pressure...
Question 54: A local government that is investigating a data exfiltration...
Question 55: A high-severity vulnerability was found on a web application...
Question 56: A security architect is reviewing the following proposed cor...
Question 57: A review of the past year's attack patterns shows that attac...
Question 58: An analyst execute a vulnerability scan against an internet-...
Question 59: A company wants to protect its intellectual property from th...
Question 60: Which of the following controls primarily detects abuse of p...
Question 61: Leveraging cryptographic solutions to protect data that is i...
Question 62: A security analyst is validating the MAC policy on a set of ...
Question 63: A recent data breach stemmed from unauthorized access to an ...
Question 64: A cybersecurity engineer analyst a system for vulnerabilitie...
Question 65: A developer wants to develop a secure external-facing web ap...
Question 66: A system administrator at a medical imaging company discover...
Question 67: An organization is considering a BYOD standard to support re...
Question 68: A security engineer is hardening a company's multihomed SFTP...
Question 69: An attacker infiltrated the code base of a hardware manufact...
Question 70: A bank is working with a security architect to find the BEST...
Question 71: An organization decided to begin issuing corporate mobile de...
Question 72: Given the following log snippet from a web server: (Exhibit)...
Question 73: A vulnerability analyst identified a zero-day vulnerability ...
Question 74: Based on PCI DSS v3.4, One Particular database field can sto...
Question 75: A company is migrating from company-owned phones to a BYOD s...
Question 76: A security engineer has been asked to close all non-secure c...
Question 77: A company Invested a total of $10 million lor a new storage ...
Question 78: A developer implement the following code snippet. (Exhibit) ...
Question 79: The Chief information Officer (CIO) of a large bank, which u...