Which of the following solutions would have prevented t…
Several computers in an organization are running below the normal performance baseline. A security administrator inspects the computers and finds the following
pieces of information:
– Several users have uninstalled the antivirus software
– Some users have installed unauthorized software
– Several users have installed pirated software
– Some computers have had automatic updating disabled after being deployed
– Users have experienced slow responsiveness when using the Internet browser
– Users have complete control over critical system properties
Which of the following solutions would have prevented these issues from occurring? (Select TWO).
Which of the following is an active technique that will…
An attacker is attempting to determine the patch level version that a web server is running on its open ports. Which of the following is an active technique that will
MOST efficiently determine the information the attacker is seeking?
Which of the following should be implemented to prevent…
A user is able to access shares that store confidential information that is not related to the user’s current job duties. Which of the following should be implemented
to prevent this from occurring?
Which of the following could the administrator use?
An administrator must select an algorithm for creating hashes of critical system files in order to later detect any unauthorized changes. Which of the following could
the administrator use? (Select TWO).
Which of the following portions of the company’s mobile…
A retired employee did not return a company issued mobile device and may have company data on the device. Which of the following portions of the company’s
mobile device management solution could be used together to remove the company data from the employee’s device? (Select TWO)
which of the following documents would the manager MOST…
A manager is reviewing bids for Internet service in support of a new corporate office location. The location will provide 24-hour service to the organization’s global
user population. In which of the following documents would the manager MOST likely find quantitative data regarding latency levels and MTTR?
Which of the following is useful in this scenario?
A forensics expert needs to be able to prove that digital evidence, originally taken into custody, has not been tampered with. Which of the following is useful in this
scenario?
Which of the following BEST describes why delayed conta…
An attacker has breached multiple lines of information security defense. Which of the following BEST describes why delayed containment would be dangerous?
Which of the following processes would close the gap id…
A recent regulatory audit discovers a large number of former employees with active accounts. Terminated users are removed from the HR system but not from
Active Directory. Which of the following processes would close the gap identified?
Which of the following would BEST provide the technicia…
After responding to a virus detection notification, a security technician has been tasked with discovering how the virus was downloaded to the client computer.
Which of the following would BEST provide the technician with information related to the attack vector?