How will you prioritize these two incidents?
Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is...
Which type of attack is James analyzing?
James was inspecting ARP packets in his organization's network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. Which type of attack is James analyzing?A . ARP SweepB . ARP misconfigurationC...
What needs to happen to force this server to use Windows Authentication?
According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. What needs to happen to force this server to use Windows Authentication?A . Edit the...
What are they?
Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk factor. What are they? (Select all that apply) Risk factor =.............X...............X...........A . VulnerabilityB . ImpactC . AttackD . ThreatView...
Which of the following countermeasure(s) should be added to deal with future malware incidents?
The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to avoid a future occurrence of the malware incident. Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)A...
How should this risk be categorized in the risk matrix?
The risk assessment team in Southern California has estimated that the probability of an incident that has potential to impact almost 80% of the bank's business is very high. How should this risk be categorized in the risk matrix?A . HighB . MediumC . ExtremeD . LowView AnswerAnswer: C Explanation:...
What is the best option to do this job?
An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?A . Install a CCTV with cameras pointing to the entrance doors...
What type of UPS has Kyle purchased?
Kyle is an IT technician managing 25 workstations and 4 servers. The servers run applications and mostly store confidential data. Kyle must backup the server's data daily to ensure nothing is lost. The power in the company's office is not always reliable, Kyle needs to make sure the servers do...
Which type of RAM will he select for his RAID system?
Brendan wants to implement a hardware based RAID system in his network. He is thinking of choosing a suitable RAM type for the architectural setup in the system. The type he is interested in provides access times of up to 20 ns. Which type of RAM will he select for...
What type of network security approach is Daniel adopting?
Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?A . PreventativeB . ReactiveC . RetrospectiveD . Defense-in-depthView AnswerAnswer: B Explanation: Daniel is adopting a Reactive network security approach. This approach involves monitoring network...