Which of the following should be implemented to prevent…
A user is able to access shares that store confidential information that is not related to the user’s current job duties. Which of the following should be implemented
to prevent this from occurring?
Which of the following could the administrator use?
An administrator must select an algorithm for creating hashes of critical system files in order to later detect any unauthorized changes. Which of the following could
the administrator use? (Select TWO).
Which of the following portions of the company’s mobile…
A retired employee did not return a company issued mobile device and may have company data on the device. Which of the following portions of the company’s
mobile device management solution could be used together to remove the company data from the employee’s device? (Select TWO)
which of the following documents would the manager MOST…
A manager is reviewing bids for Internet service in support of a new corporate office location. The location will provide 24-hour service to the organization’s global
user population. In which of the following documents would the manager MOST likely find quantitative data regarding latency levels and MTTR?
Which of the following is useful in this scenario?
A forensics expert needs to be able to prove that digital evidence, originally taken into custody, has not been tampered with. Which of the following is useful in this
scenario?
Which of the following BEST describes why delayed conta…
An attacker has breached multiple lines of information security defense. Which of the following BEST describes why delayed containment would be dangerous?
Which of the following processes would close the gap id…
A recent regulatory audit discovers a large number of former employees with active accounts. Terminated users are removed from the HR system but not from
Active Directory. Which of the following processes would close the gap identified?
Which of the following would BEST provide the technicia…
After responding to a virus detection notification, a security technician has been tasked with discovering how the virus was downloaded to the client computer.
Which of the following would BEST provide the technician with information related to the attack vector?
Which of the following BEST describes this component of…
Company policy states that when a virus or malware alert is received, the suspected host is immediately removed from the company network. Which of the
following BEST describes this component of incident response?
Which of the following can be implemented to meet this …
An old 802.11b wireless bridge must be configured to provide confidentiality of data in transit to include the MAC addresses of communicating end users. Which of
the following can be implemented to meet this requirement?