Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).
Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).A . OffboardingB . Mandatory vacationC . Job rotationD . Background checksE . Separation of dutiesF . Acceptable useView AnswerAnswer: B,C
Which of the following RAID levels should the administrator select?
A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two- drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?A . 0B . 1C . 5D . 6View AnswerAnswer: B
Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?
Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?A . TabletopB . ParallelC . Full interruptionD . SimulationView AnswerAnswer: D
The following is an administrative control that would be MOST effective to reduce the occurrence of malware execution?
The following is an administrative control that would be MOST effective to reduce the occurrence of malware execution?A . Security awareness trainingB . Frequency of NIDS updatesC . Change control proceduresD . EDR reporting cycleView AnswerAnswer: A
Which of the following would BEST meet this objective?
A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)A . Dual power supplyB . Off-site backupsC . Automatic OS upgradesD . NIC teamingE . Scheduled penetration testingF . Network-attached storageView AnswerAnswer:...
Which of the following RAID configurations should the administration use?
A security administrator needs to create a RAIS configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?A . RA1D 0B . RAID1C . RAID 5D . RAID 10View AnswerAnswer:...
Which of the following describes the BEST approach for deploying application patches?
Which of the following describes the BEST approach for deploying application patches?A . Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.B . Test the patches in a staging environment, develop against them in the development environment, and...
When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?
A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?A ....
Which of the following tools will the administrator MOST likely use to confirm the suspicions?
A security administrator suspects there may be unnecessary services running on a server. Which of the following tools will the administrator MOST likely use to confirm the suspicions?A . NmapB . WiresharkC . AutopsyD . DNSEnumView AnswerAnswer: A
Which of the following scenarios BEST describes a risk reduction technique?
Which of the following scenarios BEST describes a risk reduction technique?A . A security control objective cannot be met through a technical change, so the company purchases insurance and is no longer concerned about losses from data breaches.B . A security control objective cannot be met through a technical change,...