Which of the following would BEST meet these requirements?
A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements?...
Which of the following RAID configurations should the administration use?
A security administrator needs to create a RAIS configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?A . RA1D 0B . RAID1C . RAID 5D . RAID 10View AnswerAnswer:...
Which of the following describes what the manager is doing?
A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the...
In which of the following situations would it be BEST to use a detective control type for mitigation?
In which of the following situations would it be BEST to use a detective control type for mitigation?A . A company implemented a network load balancer to ensure 99.999% availability of its web application.B . A company designed a backup solution to increase the chances of restoring services in case...
Which of the following MOST likely the cause of the cause of the access issues?
A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?A . False rejectionB . Cross-over error rateC...
Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop?
A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports. Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)A . Trusted Platform ModuleB . A host-based firewallC...
Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?
Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?A . MOUB . MTTRC . SLAD . NDAView AnswerAnswer: C
Based on the analyst’s findings, which of the following attacks is being executed?
A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events: To better understand what is going on, the analyst runs a command and receives the following output:...
Which of the following should the engineer employ to meet these requirements?
A network engineer needs to build a solution that will allow guests at the company’s headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet....
Which of the following describes the method that was used to compromise the laptop?
A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst reviews the following SIEM log: Which of the following describes the method that was used to compromise the laptop?A . An attacker was able to move laterally from...