Which of the following can Be Implemented to increase security against a potential insider threat?

A company stores extremely sensitive data on an alt-gapped system . Which of the following can Be Implemented to increase security against a potential insider threat?A . Two-person Integrity B. SSO C. SIEM D. Faraday cage E. MFAView AnswerAnswer: E

September 23, 2022 No Comments READ MORE +

Which of the following should the technician implement?

A technician wants to limit disk usage on a server . Which of the following should the technician implement?A . Formatting B. Compression C. Disk quotas D. PartitioningView AnswerAnswer: C Explanation: Reference: https://www.digitalcitizen.life/simple-questions-what-are-disk-quotas-how-set-them-windows/

September 23, 2022 No Comments READ MORE +

Which of the following should the company also perform as a data loss prevention method?

A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy . Which of the following should the company also perform as a data loss prevention method?A . Encrypt all network traffic B. Implement MFA on all the...

September 22, 2022 No Comments READ MORE +

Which of the following subnet masks would be appropriate for this setup?

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254 . Which of the following subnet masks would be appropriate for this setup?A . 255.255.255.0 B. 255.255.255.128 C. 255.255.255.240 D. 255.255.255.254View...

September 22, 2022 No Comments READ MORE +

Which of the following should the administrator do to prevent this situation in the future?

Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off . Which of the following should the administrator do to prevent this situation in the future?A . Connect the server to a KVM B. Use cable...

September 21, 2022 No Comments READ MORE +

Which of the following backup methods does this describe?

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used . Which of the following backup methods does this describe?A . Open file B. Synthetic full C. Full Incremental D. Full differentialView AnswerAnswer: A

September 21, 2022 No Comments READ MORE +

Which of the following tools will analyze network logs in real time to report on suspicious log events?

Which of the following tools will analyze network logs in real time to report on suspicious log events?A . Syslog B. DLP C. SIEM D. HIPSView AnswerAnswer: C Explanation: Reference: https://www.manageengine.com/products/eventlog/syslog-server.html

September 21, 2022 No Comments READ MORE +

Which of the following is the MOST likely reason for the connection failure?

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is sucessful. To...

September 20, 2022 No Comments READ MORE +

Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?

A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries . Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same...

September 20, 2022 No Comments READ MORE +

Which of the following backup methods does this describe?

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used . Which of the following backup methods does this describe?A . Open file B. Synthetic full C. Full Incremental D. Full differentialView AnswerAnswer: A

September 20, 2022 No Comments READ MORE +