Which of the following should the engineer do to determine the issue?
A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use . Which of the following...
Which of the following did the assessment identify?
A security assessment determines DES and 3DES at still being used on recently deployed production servers . Which of the following did the assessment identify?A . Unsecme protocolsB . Default settingsC . Open permissionsD . Weak encryptionView AnswerAnswer: D
As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?
An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?A . Order of volatilityB . Data recoveryC . Chain of custodyD . Non-repudiationView AnswerAnswer: C
Which of the following types of controls is a turnstile?
Which of the following types of controls is a turnstile?A . PhysicalB . DetectiveC . CorrectiveD . TechnicalView AnswerAnswer: A
Which of the following RAID levels should the administrator select?
A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two- drive failure for better fault tolerance . Which of the following RAID levels should the administrator select?A . 0B . 1C . 5D . 6View AnswerAnswer: B
Which of the following biometrics will MOST likely be used, without the need for enrollment?
An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to...
Which of the following is the MOST likely reason for the user’s inability to connect the laptop to the VPN?
A remote user recently took a two-week vacation abroad and brought along a corporate-owned laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN . Which of the following is the MOST likely reason for the user’s inability to connect the laptop to...
Which of the following would meet the organization’s needs for a third factor?
An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password . Which of the following would meet the organization’s needs for a third factor?A . Date of birthB . FingerprintsC . PIND . TPMView AnswerAnswer: B
When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?
A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?A ....
Which of the following should the administrator use?
A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider . Which of the following should the administrator use?A . SDPB . AAAC . IaaSD . MSSPE . MicroservicesView...