What kind of reading material is MOST relevant to this project?

A security consultant has been asked to research an organization's legal obligations to protect privacy-related information. What kind of reading material is MOST relevant to this project?A . The organization's current security policies concerning privacy issuesB . Privacy-related regulations enforced by governing bodies applicable to the organizationC . Privacy best...

March 21, 2021 No Comments READ MORE +

What is the optimal way to automate this?

A company has a custom object, Sales Demo Request, that has a lookup to an Opportunity. It is required that a Sales Demo Request record be created when an Opportunity's Probability is greater than 50%. What is the optimal way to automate this?A . Build a Flow on Opportunity.B ....

March 21, 2021 No Comments READ MORE +

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?A . Active Directory monitoringB . Windows session monitoringC . Windows client probingD . domain controller monitoringView AnswerAnswer: A

March 21, 2021 No Comments READ MORE +

What is the project's sensitivity to staff costs?

A project has a net present value of $2 million. Total cash outflows of this project have a present value of $14 million, which includes staff costs of $10 million. What is the project's sensitivity to staff costs?A . 20%B . 63%C . 71%D . 14%View AnswerAnswer: A

March 21, 2021 No Comments READ MORE +

Which of the following would be the BEST justification?

A security engineer is attempting to convey the importance of including job rotation in a company’s standard security policies. Which of the following would be the BEST justification?A . Making employees rotate through jobs ensures succession plans can be implemented and prevents single point of failure.B . Forcing different people...

March 21, 2021 No Comments READ MORE +

Which of the following is the NEXT step the analyst should take to address the issue?

A security analyst has received information from a third-party intelligence-sharing resource that indicates employee accounts were breached. Which of the following is the NEXT step the analyst should take to address the issue?A . Audit access permissions for all employees to ensure least privilege.B . Force a password reset for...

March 21, 2021 No Comments READ MORE +

Does this meet the goal?

NOTE: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

March 21, 2021 No Comments READ MORE +

According to the forensics investigation process, what is the next step carried out right after collecting the evidence?

According to the forensics investigation process, what is the next step carried out right after collecting the evidence?A . Create a Chain of Custody DocumentB . Send it to the nearby police stationC . Set a Forensic labD . Call Organizational Disciplinary TeamView AnswerAnswer: A

March 21, 2021 No Comments READ MORE +

In this scenario, which three steps would you take to configure the SVM DR relationship?

You have two ONTAP clusters, cluster1 and cluster2. Cluster1 has an SVM serving SMB3 data and you want to protect it by replicating it to cluster2 using SVM DR. The source and destination subnets are identical. You want to retain the CIFS server security of the SVM at the destination...

March 21, 2021 No Comments READ MORE +

Which of the following recovery types is not supported for delta backups?

Which of the following recovery types is not supported for delta backups?A . Recover the database to its most recent state.B . Recover the database to a specific point in time.C . Recover the database to a specific data backup.View AnswerAnswer: C

March 21, 2021 No Comments READ MORE +