Which of the following should the administrator use?
A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee's hard disk. Which of the following should the administrator use?A . ddB . chmodC . dnaenumD . loggerView AnswerAnswer: A
To ensure the key is Afferent each time the user encrypts data which of the following should be added to the login name?
A common asymmetric algorithm utilizes the user's login name to create the key to encrypt communications. To ensure the key is Afferent each time the user encrypts data which of the following should be added to the login name?A . PGPB . NonceC . PSKD . CertificateView AnswerAnswer: B
Which of the following is the MOST likely cause of this policy violation and the BEST remediation to prevent a reoccurrence'?
An organization has the following written policies: - Users must request approval for non-standard software installation - Administrators will perform all software installations - Software must be installed from a trusted repository A recent security audit identified crypto-currency software installed on one user's machine There are no indications of compromise...
Which of the following is the BEST use of a WAF?
Which of the following is the BEST use of a WAF?A . To protect sites on web servers that are publicly accessibleB . To allow access to web services of internal users of the organizationC . To maintain connection status of all HTTP requestsD . To deny access to all...
Which of the following is MOST likely caused by improper input handling?
Which of the following is MOST likely caused by improper input handling?A . Loss of database tablesB . Untrusted certificate warningC . Power off reboot loopD . Breach of firewall ACLsView AnswerAnswer: A
Which of the following should be considered when evaluating this option?
A company Is determining where to host a hot site, and one of the locations Being considered Is In another country. Which of the following should be considered when evaluating this option?A . Mean RTOB . Mean RPOC . Data sovereigntyD . Data destruction lawsE . Backup media recycling policiesView...
Which of the following is the BEST example of this?
A security engineer wants to further secure a sensitive VLAN on the network by introducing MFA. Which of the following is the BEST example of this? A. PSK and PIN B. RSA token and password C. Fingerprint scanner and voice recognition D. Secret question and CAPTCHAView AnswerAnswer: B
Which of the following solutions is the BEST method lor controlling data exfiltration during this project?
A software development company needs to augment staff by hiring consultants for a high-stakes project. The project has the following requirements: - Consultants will have access to flighty confidential, proprietary data. - Consultants will not be provided with company-owned assets. - Work needs to start Immediately. - Consultants will be...
Which of the following could be used to protect the company's cabling as it passes through uncontrolled spaces?
A company occupies the third floor of a leased building that has other tenants. The path from the demarcation point to the company's controlled space runs through unsecured areas managed by other companies. Which of the following could be used to protect the company's cabling as it passes through uncontrolled...
Which of the following should the technician implement?
A technician wants to add wireless guest capabilities to an enterprise wireless network that is currently implementing 802.1X EAP-TLS. The guest network must - Support client Isolation. - Issue a unique encryption key to each client. - Allow guests to register using their personal email addresses Which of the following...