A cyber security engineer is installing a WAF to protect the company’s website from malicious web requests over SSL. Which of the following is needed to meet the objective?
A. A reverse proxy
B. A decryption certificate
C. A split-tunnel VPN
D. Load-balanced servers
A cyber security consultant was asked to revise the security baselines that are utilized by a large organization. Although the company provides different platforms for its staff, including desktops, laptops, and mobile devices, the applications do not vary by platform. Which of the following should the consultant recommend? (Select Two).
A. Apply patch management on a daily basis.
B. Allow full functionality for all applications that are accessed remotely
C. Apply default configurations of all operating systems
D. Apply application whitelisting.
E. Disable default accounts and/or passwords