A Chief Security Officer (CSO) is concerned about the number of successful ransomware attacks that have hit the company. The data Indicates most of the attacks came through a fake email. The company has added training, and the CSO now wants to evaluate whether the training has been successful. Which of the following should the CSO implement?
A security architect examines a section of code and discovers the following:
Which of the following changes should the security architect require before approving the code for release?
During a network defense engagement, a red team is able to edit the following registry key:
Which of the following tools is the red team using to perform this action?
A network administrator who manages a Linux web server notices the following traffic:
/etc./shadow
Which of the following Is the BEST action for the network administrator to take to defend against this type of web attack?