30. A core authentication server is exposed to the internet and is connected to sensitive services. What are some measures you can take to secure the server and prevent it from getting compromised by a hacker? Select all that apply.
33. A hacker exploited a bug in the software and triggered unintended behavior which led to the system being compromised by running vulnerable software. Which of these helps to fix these types of vulnerabilities?
37. When looking at aggregated logs, you are seeing a large percentage of Windows hosts connecting to an Internet Protocol (IP) address outside the network in a foreign country. Why might this be worth investigating more closely?
It can indicate what software is on the binary whitelist
It can indicate ACLs are not configured correctly
It can indicate a malware infection
It can indicate log normalization
Shuffle Q/A 2
38. What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen?