An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified?

An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified?A . RTOB . RPOC . MTBFD . MTTRView AnswerAnswer: A

November 30, 2018 No Comments READ MORE +

Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were unable to find the application in the app stores. Which of the following allowed Joe to install the application? (Select two.)

Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were unable to find the application in the app stores. Which of the following allowed Joe to...

November 29, 2018 No Comments READ MORE +

In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?

In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?A . ElasticityB . ScalabilityC . High availabilityD . RedundancyView AnswerAnswer: A

November 20, 2018 No Comments READ MORE +

Which of the following network-based security controls should the engineer consider implementing?

Malicious traffic from an internal network has been detected on an unauthorized port on an application server. Which of the following network-based security controls should the engineer consider implementing?A . ACLsB . HIPSC . NATD . MAC filteringView AnswerAnswer: A

November 13, 2018 No Comments READ MORE +

An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?

An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?A ....

November 10, 2018 No Comments READ MORE +

Which of the following forms of authentication are being used?

A company is currently using the following configuration: A security administrator needs to configure a new wireless setup with the following configurations: Which of the following forms of authentication are being used? (Select two.)A . PAPB . PEAPC . MSCHAPD . PEAP- MSCHAPE . EAPF . EAP-PEAPView AnswerAnswer: A,F

November 6, 2018 No Comments READ MORE +

Which of the following attacks specifically impact data availability?

Which of the following attacks specifically impact data availability?A . DDoSB . TrojanC . MITMD . RootkitView AnswerAnswer: A

November 6, 2018 No Comments READ MORE +

The security analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of the following would BEST accomplish these goals?

A security analyst wishes to increase the security of an FTP server. Currently, all traffic to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modern FTP client software. The security analyst wants to keep the same port and protocol, while also still allowing...

November 5, 2018 No Comments READ MORE +

A user has attempted to access data at a higher classification level than the user’s account is currently authorized to access. Which of the following access control models has been applied to this user’s account?

A user has attempted to access data at a higher classification level than the user’s account is currently authorized to access. Which of the following access control models has been applied to this user’s account?A . MACB . DACC . RBACD . ABACView AnswerAnswer: C

October 30, 2018 No Comments READ MORE +

A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.0:6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection?

A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.0:6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection?A . tracertB...

October 30, 2018 No Comments READ MORE +