Cybersecurity-Architecture-and-Engineering Exam Question 1

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.
Which logging mechanism will create an audit trail?
  • Cybersecurity-Architecture-and-Engineering Exam Question 2

    What is the purpose of the feature that allows only one user to modify a document at a time in collaboration software?
  • Cybersecurity-Architecture-and-Engineering Exam Question 3

    An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.
  • Cybersecurity-Architecture-and-Engineering Exam Question 4

    A company has recently completed its disaster recovery plan and is preparing to test it. The company's IT team has identified the need to simulate a disaster scenario to evaluate the effectiveness of the plan. The team has considered a few options, including a full interruption test, a walk-through, tabletop exercises, and checklists. They want to choose a testing method that will allow them to evaluate the plan in a controlled environment while minimizing the impact on the company's operations.
    Which testing method will meet the needs of the company?
  • Cybersecurity-Architecture-and-Engineering Exam Question 5

    An organization wants to implement a new encryption solution to protect sensitive data stored in a database.
    The organization wants to ensure that the encryption solution provides strong protection for the data and is willing to sacrifice performance.
    Which type of encryption meets the needs of the organization?