Which of the following protocols should be implemented to distribute the report securely?
A manager wants to distribute a report to several other managers within the company. Some of them reside in remote locations that are not connected to the domain but have a local server. Because there is sensitive data within the report and the size of the report is beyond the...
When considering a third-party cloud service provider, which of the following criteria would be the BEST to include in the security assessment process? (Choose two.)
When considering a third-party cloud service provider, which of the following criteria would be the BEST to include in the security assessment process? (Choose two.)A . Use of performance analyticsB . Adherence to regulatory complianceC . Data retention policiesD . Size of the corporationE . Breadth of applications supportView AnswerAnswer:...
Given this output, which of the following can be concluded?
A security analyst is reviewing the following output from an IPS: Given this output, which of the following can be concluded? (Choose two.)A . The source IP of the attack is coming from 250.19.18.22.B . The source IP of the attack is coming from 250.19.18.71.C . The attacker sent a...
For which of the following is the company hiring the consulting firm?
A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?A ....
If the database is restored on Tuesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery?
A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily differential backups also performed at 12:00 a.m. If the database is restored on Tuesday afternoon, which of the following is the number of individual backups that would need to be applied to complete...
Which of the following technologies employ the use of SAML? (Choose two.)
Which of the following technologies employ the use of SAML? (Choose two.)A . Single sign-onB . FederationC . LDAPD . Secure tokenE . RADIUSView AnswerAnswer: AB
When identifying a company’s most valuable assets as part of a BIA, which of the following should be the FIRST priority?
When identifying a company’s most valuable assets as part of a BIA, which of the following should be the FIRST priority?A . LifeB . Intellectual propertyC . Sensitive dataD . Public reputationView AnswerAnswer: A
Which of the following implements two-factor authentication?
Which of the following implements two-factor authentication?A . A phone system requiring a PIN to make a callB . At ATM requiring a credit card and PINC . A computer requiring username and passwordD . A datacenter mantrap requiring fingerprint and iris scanView AnswerAnswer: B
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system. While attempting to determine if an authorized user is logged into the home network, the user reviews the wireless router, which shows the following table for systems that are...
Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser?
Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser?A . Buffer overflowB . MITMC . XSSD . SQLiView AnswerAnswer: C