Which of the following controls does a mantrap BEST represent?

Which of the following controls does a mantrap BEST represent?A . DeterrentB . DetectiveC . PhysicalD . CorrectiveView AnswerAnswer: B

December 1, 2020 No Comments READ MORE +

Which of the following technologies should the company use?

A company is looking for an all-in-one solution to provide identification authentication, authorization, and accounting services. Which of the following technologies should the company use?A . DiameterB . SAMLC . KerberosD . CHAPView AnswerAnswer: D

December 1, 2020 No Comments READ MORE +

Which of the following is an element of the BIA that this action is addressing?

A company is performing an analysis of the corporate enterprise network with the intent of identifying any one system, person, function, or service that, when neutralized, will cause or cascade disproportionate damage to the company’s revenue, referrals, and reputation. Which of the following is an element of the BIA that...

December 1, 2020 No Comments READ MORE +

Which of the following is the BEST solution?

A Chief Information Officer (CIO) wants to eliminate the number of calls help desk is receiving for password resets when users log on to internal portals. Which of the following is the BEST solution?A . Increase password lengthB . Implement a self-service portalC . Decrease lockout thresholdD . Deploy mandatory...

December 1, 2020 No Comments READ MORE +

Which of the following control types would a backup of server data provide in case of a system issue?

Which of the following control types would a backup of server data provide in case of a system issue?A . CorrectorB . DeterrentC . PreventiveD . DetectiveView AnswerAnswer: A

December 1, 2020 No Comments READ MORE +

Which of the following identity access methods creates a cookie on the first logic to a central authority to allow logins to subsequent applications without referring credentials?

Which of the following identity access methods creates a cookie on the first logic to a central authority to allow logins to subsequent applications without referring credentials?A . Multifactor authenticationB . Transitive trustC . Federated accessD . Single sign-onView AnswerAnswer: D

December 1, 2020 No Comments READ MORE +

Which of the following types of vulnerability scans should be conducted?

A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date. The administrator wants to limit disruptions to operations but not consume too many resources. Which of the following types of vulnerability scans should be conducted?A . CredentialedB . Non-IntrusiveC...

November 30, 2020 No Comments READ MORE +

Which of the following should the technician implement?

A technician is required to configure updates on a guest operating system while maintaining the ability to quickly revert the changes that were made while testing the updates. Which of the following should the technician implement?A . SnapshotsB . Revert to known stateC . Rollback to known configurationD . Shadow...

November 30, 2020 No Comments READ MORE +

Which of the following BEST represents what happened?

Staff members of an organization received an email message from the Chief Executive Officer (CEO) asking them for an urgent meeting in the main conference room. When the staff assembled, they learned the message received was not actually from the CEO. Which of the following BEST represents what happened?A ....

November 30, 2020 No Comments READ MORE +

Which of the following Is a resiliency strategy that allows a system to automatically adapt to workload changes?

Which of the following Is a resiliency strategy that allows a system to automatically adapt to workload changes?A . Fault toleranceB . RedundancyC . ElasticityD . High availabilityView AnswerAnswer: C

November 30, 2020 No Comments READ MORE +