In which of the following steps should technicians connect domain controllers to the net-work and begin authenticating users again?
A company recently experienced a security incident in which its domain controllers were the target of a DoS attack. In which of the following steps should technicians connect domain controllers to the net-work and begin authenticating users again?A . PreparationB . IdentificationC . ContainmentD . EradicationE . RecoveryF . Lessons...
Which of the following was recently added to the laptop?
A salesperson often uses a USB drive to save and move files from a corporate laptop. The corporate laptop was recently updated, and now the files on the USB are read-only. Which of the following was recently added to the laptop?A . Antivirus softwareB . File integrity checkC . HIPSD...
Which of the following access control methods should managers use to assign after-hours access to the employees?
Several systems and network administrators are determining how to manage access to a facility and enable managers to allow after-hours access. Which of the following access control methods should managers use to assign after-hours access to the employees?A . Rule-based access controlB . Discretionary access controlC . Mandatory access controlD...
Which of the following practices would BEST help to prevent this situation in the future?
A company employee recently retired, and there was a schedule delay because no one was capable of filling the employee’s position. Which of the following practices would BEST help to prevent this situation in the future?A . Mandatory vacationB . Separation of dutiesC . Job rotationD . Exit interviewsView AnswerAnswer:...
Which of the following control types Is an IDS?
A network administrator has been asked to install an IDS to improve the security posture of an organization. Which of the following control types Is an IDS?A . CorrectiveB . PhysicalC . DetectiveD . AdministrativeView AnswerAnswer: C
Which of the following account management practices should be modified to ease the burden?
The Chief Information Officer (CIO) has heard concerns from the business and the help desk about frequent user account lockouts. Which of the following account management practices should be modified to ease the burden?A . Password complexityB . Account disablementC . False-rejection rateD . Time-of-day restrictionsView AnswerAnswer: A
Which of the following protocols does the technician MOST likely need to configure?
A customer calls a technician and needs to remotely connect to a web server to change some code manually. The technician needs to configure the user's machine with protocols to connect to the Unix web server, which is behind a firewall. Which of the following protocols does the technician MOST...
Which of the following BEST describes why an air gap is a useful security control?
Which of the following BEST describes why an air gap is a useful security control?A . It physically isolates two or more networks, therefore helping prevent cross contamination or accidental data spillage.B . It requires that files be transferred via USB instead of networks that are potentially vulnerable to hacking,...
Which of the following is a secure solution that is the MOST cost effective?
A Chief Information Security Officer (CISO) for a school district wants to enable SSL to protect all of the public-facing servers in the domain. Which of the following is a secure solution that is the MOST cost effective?A . Create and install a self-signed certificate on each of the servers...
Which of the following is the MOST likely cause and next step?
An application developer is working on a new calendar and scheduling application. The developer wants to test new functionality that is time/date dependent and set the local system time to one year in the future. The application also has a feature that uses SHA-256 hashing and AES encryption for data...