Which of the following RAID levels should the administrator select?

A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two- drive failure for better fault tolerance . Which of the following RAID levels should the administrator select?A . 0B . 1C . 5D . 6View AnswerAnswer: B

April 27, 2022 1 Comment READ MORE +

Which of the following biometrics will MOST likely be used, without the need for enrollment?

An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to...

April 27, 2022 No Comments READ MORE +

Which of the following is the MOST likely reason for the user’s inability to connect the laptop to the VPN?

A remote user recently took a two-week vacation abroad and brought along a corporate-owned laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN . Which of the following is the MOST likely reason for the user’s inability to connect the laptop to...

April 27, 2022 No Comments READ MORE +

Which of the following would meet the organization’s needs for a third factor?

An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password . Which of the following would meet the organization’s needs for a third factor?A . Date of birthB . FingerprintsC . PIND . TPMView AnswerAnswer: B

April 26, 2022 No Comments READ MORE +

When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?

A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?A ....

April 26, 2022 No Comments READ MORE +

Which of the following should the administrator use?

A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider . Which of the following should the administrator use?A . SDPB . AAAC . IaaSD . MSSPE . MicroservicesView...

April 26, 2022 No Comments READ MORE +

Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)

Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)A . Cross-site scriptingB . Data exfiltrationC . Poor system loggingD ....

April 26, 2022 2 Comments READ MORE +

Which of the following technologies are being utilized to provide these capabilities?

Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time . Which of the following...

April 26, 2022 No Comments READ MORE +

Which of the following plans is the organization MOST likely developing?

An organization is developing a plan in the event of a complete loss of critical systems and data . Which of the following plans is the organization MOST likely developing?A . Incident responseB . CommunicationsC . Disaster recoveryD . Data retentionView AnswerAnswer: C

April 26, 2022 No Comments READ MORE +

Which of the following is the BEST solution to protect these designs?

A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet . Which of the following is the BEST solution to protect these designs?A . An air gapB ....

April 26, 2022 No Comments READ MORE +