Which of the following are required to BEST meet these objectives?
A Chief Information Security Officer has defined resiliency requirements for a new data center architecture. The requirements are as follows • Critical fileshares will remain accessible during and after a natural disaster • Frve percent of hard disks can fail at any given time without impacting the data. • Systems...
Which of the following would BEST describe the estimated number of devices to be replaced next year?
An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...
Which of the following should the organization use to compare biometric solutions?
An organization wants to implement a biometric system with the highest likelihood that an unauthorized user will be denied access. Which of the following should the organization use to compare biometric solutions?A . FRR B. Difficulty of use C. Cost D. FAR E. CERView AnswerAnswer: A
Which of the following does this process BEST protect?
A technician enables full disk encryption on a laptop that will be taken on a business tnp. Which of the following does this process BEST protect?A . Data in transit B. Data in processing C. Data at rest D. Data tokenizationView AnswerAnswer: C Explanation: Data at rest: Data at rest...
Which of the following describes the continuous delivery software development methodology?
Which of the following describes the continuous delivery software development methodology?A . Waterfall B. Spiral C. V-shaped D. AgileView AnswerAnswer: D
Which of the following incident response processes is the CISO requesting?
The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?A . Lessons learned B. Preparation C. Detection D. Containment E. Root cause analysisView AnswerAnswer: A
Which of the following actions would be BEST to prevent reinfection from the initial infection vector?
An organization has activated an incident response plan due to a malware outbreak on its network. The organization has brought in a forensics team that has identified an internet-facing Windows server as the likely point of initial compromise. The malware family that was detected is known to be distributed by...
A company labeled some documents with the public sensitivity classification.
A company labeled some documents with the public sensitivity classification. This means the documents can be accessed by:A . employees of other companies and the press B. all members of the department that created the documents C. only the company's employees and those listed in the document D. only the...
Which of the following methods will the analyst MOST likely use?
A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst MOST likely use?A . Look for tampenng on the evidence collection bag B. Encrypt the collected data using asymmetric encryption C. Ensure proper procedures for...
Which of the following would BEST describe the estimated number of devices to be replaced next year?
An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...