Which of the following concepts should be considered to help ensure data security?

Joe a system architect wants to implement appropriate solutions to secure the company's distributed database. Which of the following concepts should be considered to help ensure data security? (Select TWO)A . Data at restB . Data in useC . ReplicationD . WipingE . RetentionF . Cloud StorageView AnswerAnswer: AE

October 17, 2019 No Comments READ MORE +

Which of the following is the MOST appropriate control for the architect to focus onto ensure confidentiality of data stored on laptops?

A security architect is designing an enterprise solution for the sales force of a corporation which handles sensitive customer data. The solution must allow users to work from remote offices and support traveling users. Which of the following is the MOST appropriate control for the architect to focus onto ensure...

October 15, 2019 No Comments READ MORE +

Which of the following access control methodologies provides an individual with the most restrictive access rights to successfully perform their authorized duties?

Which of the following access control methodologies provides an individual with the most restrictive access rights to successfully perform their authorized duties?A . Mandatory Access ControlB . Rule Based Access ControlC . Least PrivilegeD . Implicit DenyE . Separation of DutiesView AnswerAnswer: C

October 14, 2019 No Comments READ MORE +

Which of the following describes this type of control?

An administrator is configuring a new Linux web server where each user account is confined to a cheroot jail. Which of the following describes this type of control?A . SysVB . SandboxC . ZoneD . SegmentationView AnswerAnswer: B

October 13, 2019 No Comments READ MORE +

Which of the following methods will be effective for this purpose?

A Chief Executive Officer (CEO) is steering company towards cloud computing. The CEO is requesting a federated sign-on method to have users sign into the sales application. Which of the following methods will be effective for this purpose?A . SAMLB . RADIUSC . KerberosD . LDAPView AnswerAnswer: A

October 13, 2019 No Comments READ MORE +

Which of the following access control methods is MOST appropriate for preventing such occurrences in the future?

Joe is a helpdesk specialist. During a routine audit, a company discovered that his credentials were used while he was on vacation. The investigation further confirmed that Joe still has his badge and it was last used to exit the facility. Which of the following access control methods is MOST...

October 12, 2019 No Comments READ MORE +

When viewing IPS logs the administrator see systems all over the world scanning the network for servers with port 22 open.

When viewing IPS logs the administrator see systems all over the world scanning the network for servers with port 22 open. The administrator concludes that this traffic is a(N):A . RiskB . VulnerabilityC . ExploitD . ThreatView AnswerAnswer: D

October 11, 2019 No Comments READ MORE +

Which of the following should be selected?

A forensics analyst is tasked identifying identical files on a hard drive. Due to the large number of files to be compared, the analyst must use an algorithm that is known to have the lowest collision rate. Which of the following should be selected?A . MD5B . RC4C . SHA-128D...

October 11, 2019 No Comments READ MORE +

Which two code fragments, independently, print each element in this array?

Given the following array: Which two code fragments, independently, print each element in this array? (Choose two.)A . B . C . D . E . F . View AnswerAnswer: BE

October 8, 2019 No Comments READ MORE +

Which of the following risk mitigation strategies would be MOST appropriate when a user changes job roles?

Ann a user has been promoted from a sales position to sales manager. Which of the following risk mitigation strategies would be MOST appropriate when a user changes job roles?A . Implement data loss preventionB . Rest the user passwordC . User permissions reviewD . Notify incident managementView AnswerAnswer: C

October 5, 2019 No Comments READ MORE +