Multiple Choice
An information security analyst on a threat-hunting team is working with administrators to create a hypothesis related to an internally developed web application. The working hypothesis is as follows: Due to the nature of the industry, the application hosts sensitive data associated with many clients and is a significant target. The platform is most likely vulnerable to poor patching and inadequate server hardening, which expose vulnerable services. The application is likely to be targeted with SQL injection attacks due to the large number of reporting capabilities within the application. As a result, the systems administrator upgrades outdated service applications and validates the endpoint configuration against an industry benchmark. The analyst suggests developers receive additional training on implementing identity and access management, and also implements a WAF to protect against SQL injection attacks. Which of the following BEST represents the technique in use?
A) Improving detection capabilities
B) Bundling critical assets
C) Profiling threat actors and activities
D) Reducing the attack surface area
Correct Answer:

Verified
Correct Answer:
Verified
Q25: An analyst is participating in the solution
Q26: A Chief Information Security Officer (CISO) wants
Q27: Which of the following BEST articulates the
Q28: During a review of vulnerability scan results,
Q29: Which of the following sources would a
Q31: A pharmaceutical company's marketing team wants to
Q32: An analyst is working with a network
Q33: A security analyst is reviewing a web
Q34: A security analyst is scanning the network
Q35: Which of the following would MOST likely