Which of the following should the administrator implement?
A security administrator currently spends a large amount of time on common security tasks, such aa report generation, phishing investigations, and user provisioning and deprovisioning This prevents the administrator from spending time on other security projects. The business does not have the budget to add more staff members. Which of...
Which of the following must be less than 12 hours to maintain a positive total cost of ownership?
A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?A . MTBFB . RPOC...
Which of the following would be MOST suitable for training the developers'?
A company's Chief Information Office (CIO) is meeting with the Chief Information Security Officer (CISO) to plan some activities to enhance the skill levels of the company's developers. Which of the following would be MOST suitable for training the developers'?A . A capture-the-flag competitionB . A phishing simulationC . Physical...
Which of the following BEST describes the attack that was attempted against the forum readers?
An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?A . SOU attackB . DLL...
Which of the following is the BEST solution to protect these designs?
A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?A . An air gapB . A...
Which of the following access control schemes BEST fits the requirements?
A system administrator needs to implement an access control scheme that will allow an object’s access policy be determined by its owner. Which of the following access control schemes BEST fits the requirements?A . Role-based access controlB . Discretionary access controlC . Mandatory access controlD . Attribute-based access controlView AnswerAnswer:...
Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).
Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).A . OffboardingB . Mandatory vacationC . Job rotationD . Background checksE . Separation of dutiesF . Acceptable useView AnswerAnswer: B,C
Which of the following RAID levels should the administrator select?
A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two- drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?A . 0B . 1C . 5D . 6View AnswerAnswer: B
Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?
Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?A . TabletopB . ParallelC . Full interruptionD . SimulationView AnswerAnswer: D
The following is an administrative control that would be MOST effective to reduce the occurrence of malware execution?
The following is an administrative control that would be MOST effective to reduce the occurrence of malware execution?A . Security awareness trainingB . Frequency of NIDS updatesC . Change control proceduresD . EDR reporting cycleView AnswerAnswer: A