Which of the following would BEST protect the company from data exfiltration via removable media?
A company has drafted an insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media?A . Monitoring large data transfer transactions in the firewall logsB . Developing mandatory training to educate employees about the removable...
Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?
Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?A . FootprintingB . White-box testingC . A drone/UAVD . PivotingView AnswerAnswer: A
Which of the following should the engineer employ to meet these requirements?
A network engineer needs to build a solution that will allow guests at the company’s headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet....
Which of the following cloud models provides clients with servers, storage, and networks but nothing else?
Which of the following cloud models provides clients with servers, storage, and networks but nothing else?A . SaaSB . PaaSC . IaaSD . DaaSView AnswerAnswer: C
Which of the following solutions would meet the requirements?
An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: - Check-in/checkout of credentials - The ability to use but not know the password - Automated password changes - Logging of access to credentials Which of the following solutions would meet...
Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?
Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?A . The document is a honeyfile and is meant to attract the attention of a cyberintruder.B . The document is a backup...