Which of the following RAID levels meets this requirements?
A critical file server is being upgraded and the systems administrator must determine which RAID level the new server will need to achieve parity and handle two simultaneous disk failures. Which of the following RAID levels meets this requirements?A . RAID 0+1B . RAID 2C . RAID 5D . RAID...
Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).
Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).A . OffboardingB . Mandatory vacationC . Job rotationD . Background checksE . Separation of dutiesF . Acceptable useView AnswerAnswer: B,C
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.A . validate the vulnerability exists in the organization's network through penetration testingB . research the appropriate mitigation techniques in a vulnerability databaseC . find the software patches that are...
Which of the following would be the BEST method to increase the security on the Linux server?
A cybersecurity department purchased o new PAM solution. The team is planning to randomize the service account credentials of the Windows server first. Which of the following would be the BEST method to increase the security on the Linux server?A . Randomize the shared credentialsB . Use only guest accounts...
Which of the following tools will the administrator MOST likely use to confirm the suspicions?
A security administrator suspects there may be unnecessary services running on a server. Which of the following tools will the administrator MOST likely use to confirm the suspicions?A . NmapB . WiresharkC . AutopsyD . DNSEnumView AnswerAnswer: A
Which of the following technologies should the IT manager use when implementing MFA?
A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C
Which of the following security practices would have addressed the issue?
A retail executive recently accepted a job with a major competitor. The following week, a security analyst reviews the security logs and identifies successful logon attempts to access the departed executive's accounts. Which of the following security practices would have addressed the issue?A . A non-disclosure agreementB . Least privilegeC...
Which of the following would BEST prevent this attack from reoccurring?
A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers. Once infected, computers are encrypted and held for ransom. Which of the following would BEST prevent this attack from reoccurring?A . Configure the perimeter firewall to deny inbound external connections to SMB...
Which of the following types of controls is a turnstile?
Which of the following types of controls is a turnstile?A . PhysicalB . DetectiveC . CorrectiveD . TechnicalView AnswerAnswer: A
Which of the following should be performed to accomplish this task?
A security modern may have occurred on the desktop PC of an organization's Chief Executive Officer (CEO) A duplicate copy of the CEO's hard drive must be stored securely to ensure appropriate forensic processes and the chain of custody are followed. Which of the following should be performed to accomplish...