Which of the following disaster recovery tests is the LEAST time consuming for the disaster recovery team?

Which of the following disaster recovery tests is the LEAST time consuming for the disaster recovery team?A . TabletopB . ParallelC . Full interruptionD . SimulationView AnswerAnswer: A Explanation: A tabletop exercise is a type of disaster recovery test that simulates a disaster scenario in a discussion-based format, without actually...

September 14, 2024 No Comments READ MORE +

Which of the following roles would MOST likely include these responsibilities?

An organization's Chief Information Security Officer is creating a position that will be responsible for implementing technical controls to protect data, including ensuring backups are properly maintained. Which of the following roles would MOST likely include these responsibilities?A . Data protection officerB . Data ownerC . Backup administratorD . Data...

September 14, 2024 No Comments READ MORE +

Which of the following attacks is being conducted?

A security analyst reports a company policy violation in a case in which a large amount of sensitive data is being downloaded after hours from various mobile devices to an external site. Upon further investigation, the analyst notices that successful login attempts are being conducted with impossible travel times during...

September 14, 2024 No Comments READ MORE +

Which of the following BEST describes the importance of the final phase of the incident response plan?

A security incident has been resolved. Which of the following BEST describes the importance of the final phase of the incident response plan?A . It examines and documents how well the team responded discovers what caused the incident, and determines how the incident can be avoided in the futureB ....

September 14, 2024 No Comments READ MORE +

Which of the following should the company Implement to prevent this type of attack from occurring in the future?

A company recently experienced an attack during which 5 main website was directed to the atack-er’s web server, allowing the attacker to harvest credentials from unsuspecting customers. Which of the following should the company Implement to prevent this type of attack from occurring in the future?A . IPSecB . SSL/TLSC...

September 13, 2024 No Comments READ MORE +

Which of the following should be MOST concerning to the company?

A company uses a drone for precise perimeter and boundary monitoring. Which of the following should be MOST concerning to the company?A . PrivacyB . Cloud storage of telemetry dataC . GPS spoofingD . Weather eventsView AnswerAnswer: A Explanation: The use of a drone for perimeter and boundary monitoring can...

September 13, 2024 No Comments READ MORE +

Which of the following environment utilizes dummy data and is MOST to be installed locally on a system that allows to be assessed directly and modified easily wit each build?

Which of the following environment utilizes dummy data and is MOST to be installed locally on a system that allows to be assessed directly and modified easily wit each build?A . ProductionB . TestC . StagingD . DevelopmentView AnswerAnswer: D Explanation: The environment that utilizes dummy data and is most...

September 12, 2024 No Comments READ MORE +

Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?

Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?A . PulverizingB . ShreddingC . IncineratingD . DegaussingView AnswerAnswer: B Explanation: Shredding may be the most secure and cost-effective way to destroy electronic data in any media that...

September 12, 2024 No Comments READ MORE +

Which of the following will the engineer MOST likely use to achieve this objective?

A security engineer needs to build @ solution to satisfy regulatory requirements that stale certain critical servers must be accessed using MFA However, the critical servers are older and are unable to support the addition of MFA. Which of the following will the engineer MOST likely use to achieve this...

September 12, 2024 No Comments READ MORE +

Which of the following would BEST allow this objective to be met?

The Chief Technology Officer of a local college would like visitors to utilize the school's WiFi but must be able to associate potential malicious activity to a specific person. Which of the following would BEST allow this objective to be met?A . Requiring all new, on-site visitors to configure their...

September 12, 2024 No Comments READ MORE +