PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which of the following should be implemented if all the organizations use the native 802.1x client on their mo

Multiple organizations operating in the same vertical want to provide seamless wireless access for their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices? A. Shibboleth B. RADIUS federation C. SAML D. OAuth E. OpenID connect Explanation: […]

The socket identified on the firewall was traced to 207.46.130.0:6666. Which of the following should the secur

A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.0:6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection? A. tracert B. netstat C. ping D. […]

Given the above outputs, which of the following MOST likely happened?

A security administrator has found a hash in the environment known to belong to malware. The administrator then finds this file to be in in the preupdate area of the OS, which indicates it was pushed from the central patch system. File: winx86_adobe_flash_upgrade.exe Hash: 99ac28bede43ab869b853ba62c4ea243 The administrator pulls a report from the patch management system […]

Which of the following account types is the systems administrator using?

A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using? A. Shared account B. Guest account C. Service account D. User account

Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of s

A systems administrator needs to configure a set of policies to protect the data to comply with mandatory regulations. Which of the following should the administrator implement to ensure DLP efficiently prevents the exposure of sensitive data in a cloud environment? A. Integrity B. Versioning C. Classification D. Segmentation Reference: https://cloud.google.com/dlp/docs


Page 13 of 461« First...1112131415...203040...Last »