Examlex
An information security analyst on a threat-hunting team is working with administrators to create a hypothesis related to an internally developed web application. The working hypothesis is as follows: Due to the nature of the industry, the application hosts sensitive data associated with many clients and is a significant target. The platform is most likely vulnerable to poor patching and inadequate server hardening, which expose vulnerable services. The application is likely to be targeted with SQL injection attacks due to the large number of reporting capabilities within the application. As a result, the systems administrator upgrades outdated service applications and validates the endpoint configuration against an industry benchmark. The analyst suggests developers receive additional training on implementing identity and access management, and also implements a WAF to protect against SQL injection attacks. Which of the following BEST represents the technique in use?
Q26: A large finance firm processes three times
Q45: A security analyst at a technology solutions
Q103: A security analyst discovers accounts in sensitive
Q121: There has been a change in requirements
Q130: A consultant is helping a gaming-as-a-service company
Q157: A financial institution's business unit plans to
Q167: A firewall specialist has been newly assigned
Q185: A company wants to implement a public
Q192: Which of the following is the function
Q374: A security analyst is troubleshooting a scenario