- All Exams Instant Download
An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified?
An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified?A . RTOB . RPOC . MTBFD . MTTRView AnswerAnswer: A
Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were unable to find the application in the app stores. Which of the following allowed Joe to install the application? (Select two.)
Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were unable to find the application in the app stores. Which of the following allowed Joe to...
In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?
In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?A . ElasticityB . ScalabilityC . High availabilityD . RedundancyView AnswerAnswer: A
Which of the following network-based security controls should the engineer consider implementing?
Malicious traffic from an internal network has been detected on an unauthorized port on an application server. Which of the following network-based security controls should the engineer consider implementing?A . ACLsB . HIPSC . NATD . MAC filteringView AnswerAnswer: A
An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?
An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?A ....
Which of the following forms of authentication are being used?
A company is currently using the following configuration: A security administrator needs to configure a new wireless setup with the following configurations: Which of the following forms of authentication are being used? (Select two.)A . PAPB . PEAPC . MSCHAPD . PEAP- MSCHAPE . EAPF . EAP-PEAPView AnswerAnswer: A,F
Which of the following attacks specifically impact data availability?
Which of the following attacks specifically impact data availability?A . DDoSB . TrojanC . MITMD . RootkitView AnswerAnswer: A
The security analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of the following would BEST accomplish these goals?
A security analyst wishes to increase the security of an FTP server. Currently, all traffic to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modern FTP client software. The security analyst wants to keep the same port and protocol, while also still allowing...
A user has attempted to access data at a higher classification level than the user’s account is currently authorized to access. Which of the following access control models has been applied to this user’s account?
A user has attempted to access data at a higher classification level than the user’s account is currently authorized to access. Which of the following access control models has been applied to this user’s account?A . MACB . DACC . RBACD . ABACView AnswerAnswer: C
A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.0:6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection?
A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.0:6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection?A . tracertB...