Which of the following representatives of the incident response team takes forensic backups of systems that are the focus of an incident?
Which of the following representatives of the incident response team takes forensic backups of systems that are the focus of an incident?A . Technical representativeB . Lead investigatorC . Information security representativeD . Legal representativeView AnswerAnswer: A Explanation: A technical representative creates forensic backups of systems that are the focus...
What are two tenants of establishing an SD-perimeter? (Choose two.)
What are two tenants of establishing an SD-perimeter? (Choose two.)A . Securing device accessB . Securing app accessC . Securing user-device trustD . Securing endpointsE . Securing network accessView AnswerAnswer: A B
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C
What should you include in the recommendation?
Your network contains an Active Directory domain that is synced to Microsoft Azure Active Directory (Azure AD). The domain contains 500 laptops that run Windows 8.1 Professional. The users of the laptops work from home. Your company uses Microsoft Intune, the Microsoft Deployment Toolkit (MDT), and Windows Configuration Designer to...
Which action tests the routing?
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?A . Ensure that the client computers are pointing to the on-premises DNS servers.B . Enable the Intelligent Proxy to validate that traffic...
What should you configure?
Your company has a Microsoft Azure Active Directory (Azure AD) tenant. The company has a Volume Licensing Agreement and uses a product key to activate Windows 10. You plan to deploy Windows 10 Pro to 200 new computers by using the Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS)....
What will happen to unauthenticated users when an active authentication policy is followed by a fall through policy without authentication?
Examine the FortiGate configuration: What will happen to unauthenticated users when an active authentication policy is followed by a fall through policy without authentication?A . The user must log in again to authenticate.B . The user will be denied access to resources without authentication.C . The user will not be...
Which algorithm provides encryption and authentication for data plane communication?
Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A
What are two solutions Cisco offers for web security? (Choose two.)
What are two solutions Cisco offers for web security? (Choose two.)A . CRESB . NGFWC . CloudlockD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: D B
Which two statements about antivirus scanning mode are true? (Choose two.)
Which two statements about antivirus scanning mode are true? (Choose two.)A . In proxy-based inspection mode, antivirus buffers the whole file for scanning, before sending it to the client.B . In full scan flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.C . In...