Which of the following must be considered when designing a high-availability network? (Select two).
Which of the following must be considered when designing a high-availability network? (Select two).A . Ease of recoveryB . Ability to patchC . Physical isolationD . ResponsivenessE . Attack surfaceF . Extensible authenticationView AnswerAnswer: AE Explanation: A high-availability network is a network that is designed to minimize downtime and ensure...
Which of the following must be considered when designing a high-availability network? (Choose two).
Which of the following must be considered when designing a high-availability network? (Choose two).A . Ease of recoveryB . Ability to patchC . Physical isolationD . ResponsivenessE . Attack surfaceF . Extensible authenticationView AnswerAnswer: A, E Explanation: A high-availability network is a network that is designed to minimize downtime and...
Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?
An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type...
Which of the following is the type of data these employees are most likely to use in day-to-day work activities?
Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?A . EncryptedB . Intellectual propertyC . CriticalD . Data...
Which of the following reconnaissance types is the tester performing?
A penetration tester begins an engagement by performing port and service scans against the client environment according to the rules of engagement. Which of the following reconnaissance types is the tester performing?A . ActiveB . PassiveC . DefensiveD . OffensiveView AnswerAnswer: A Explanation: Active reconnaissance is a type of reconnaissance...
Which of the following types of infections is present on the systems?
An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?A . VirusB . TrojanC . SpywareD . RansomwareView AnswerAnswer: D Explanation: Ransomware is a type...
Which of the following describes the process of concealing code or text inside a graphical image?
Which of the following describes the process of concealing code or text inside a graphical image?A . Symmetric encryptionB . HashingC . Data maskingD . SteganographyView AnswerAnswer: D Explanation: Steganography is the process of hiding information within another medium, such as an image, audio, video, or text file. The hidden...
Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?
Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?A . EncryptionB . HashingC . MaskingD . TokenizationView AnswerAnswer: C Explanation: Masking is a method to secure credit card data that...
Which of the following encryption techniques should the security administrator use?
A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?A . PartitionB . AsymmetricC . Full diskD . DatabaseView AnswerAnswer: C Explanation: Full disk encryption (FDE) is a technique that encrypts all the data on a hard drive,...
Which of the following best describes what the security analyst should do to identify this behavior?
A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks. SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?A . [Digital forensicsB . E-discoveryC . Incident responseD...