Which of the following RAID configurations should the administration use?

A security administrator needs to create a RAIS configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?A . RA1D 0B . RAID1C . RAID 5D . RAID 10View AnswerAnswer:...

August 23, 2021 No Comments READ MORE +

Which of the following is MOST likely the cause?

A company's help desk received several AV alerts indicating Mimikatz attempted to run on the remote systems. Several users also reported that the new company flash drives they picked up in the break room only have 512KB of storage. Which of the following is MOST likely the cause?A . The...

August 22, 2021 No Comments READ MORE +

Which of the following would BEST protect the company from data exfiltration via removable media?

A company has drafted an insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media?A . Monitoring large data transfer transactions in the firewall logsB . Developing mandatory training to educate employees about the removable...

August 22, 2021 No Comments READ MORE +

Which of the following access control schemes would be BEST for the company to implement?

A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?A . DiscretionaryB . Rule-basedC . Role-basedD . MandatoryView AnswerAnswer: D

August 22, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

A financial analyst is expecting an email containing sensitive information from a client. When the email arrives, the analyst receives an error and is unable to open the encrypted message. Which of the following is the MOST likely cause of the issue?A . The S/MME plug-in is not enabled.B ....

August 22, 2021 No Comments READ MORE +

Which of the following would work BEST to help identify potential vulnerabilities?

An organization is concerned that its hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?A . hping3 -S corsptia.org -p 80B . nc ―1 ―v comptia.org -p 80C . nmap comptia.org -p 80 ―sVD...

August 22, 2021 No Comments READ MORE +

Which of the following frameworks should the management team follow?

A multinational organization that offers web-based services has datacenters that are located only in the United States; however, a large number of its customers are in Australia, Europe, and China. Payments for services are managed by a third party in the United Kingdom that specializes in payment gateways. The management...

August 22, 2021 1 Comment READ MORE +

Which of the following would be the BEST to use?

A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?A . IDS solutionB . EDR solutionC . HIPS software solutionD . Network DLP solutionView AnswerAnswer: D

August 22, 2021 No Comments READ MORE +

In which of the following common use cases would steganography be employed?

In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A

August 21, 2021 No Comments READ MORE +

Which of the following is the MOST likely attack type?

A security analyst is reviewing a penetration-testing report from a third-party contractor. The penetration testers used the organization's new API to bypass a driver to perform privilege escalation on the organization's web servers. Upon looking at the API, the security analyst realizes the particular API call was to a legacy...

August 21, 2021 No Comments READ MORE +