Which of the following should be implemented to correct this issue?
Technicians working with servers hosted at the company's datacenter are increasingly complaining of electric shocks when touching metal items which have been linked to hard drive failures. Which of the following should be implemented to correct this issue?A . Decrease the room temperatureB . Increase humidity in the roomC ....
Which of the following is the BEST course of action to ensure data confidentiality?
A portable data storage device has been determined to have malicious firmware. Which of the following is the BEST course of action to ensure data confidentiality?A . Format the deviceB . Re-image the deviceC . Perform virus scan in the deviceD . Physically destroy the deviceView AnswerAnswer: C
Which of the following technologies allows for encrypted authentication of wireless clients over TLS?
An analyst wants to implement a more secure wifeless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?A . PEAPB . EAPC . WPA2D . RADIUSView AnswerAnswer: A Explanation: EAP by itself is only an authentication framework. PEAP (Protected Extensible...
Given these requirements, which of the following technologies should the analyst recommend and configure?
A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?A . LDAP servicesB . Kerberos servicesC . NTLM servicesD . CHAP servicesView AnswerAnswer: B...
Which of the following types of malware is MOST likely causing this issue?
A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?A . BotnetB . RansomwareC . Polymorphic malwareD . Armored virusView AnswerAnswer: A
Which of the following technologies BEST supports the deployment DNSSEC at the organization?
An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment DNSSEC at the organization?A . LDAPB . TPMC . TLSD . SSLE . PWView AnswerAnswer: C
Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?
Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?A . SustainabilityB . HomogeneityC . ResiliencyD . ConfigurabilityView AnswerAnswer: C
Which of the following describes the type of attack the proxy has been legitimately programmed to perform?
A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troubleshooting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the local machine. Which of the following describes the type of...
Which of the following is the MOST likely risk in this situation?
A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the default driver and print settings. Which of the following is the MOST likely risk in this situation?A . An attacker can access and change the printer configuration.B . SNMP data leaving the printer...
Which of the following is the correct order in which Joe should collect the data?
A member of a digital forensics team, Joe arrives at a crime scene and is preparing to collect system data. Before powering the system off, Joe knows that he must collect the most volatile date first. Which of the following is the correct order in which Joe should collect the...