Which of the following should be used to meet the requi…
A company is implementing a system to transfer direct deposit information to a financial institution. One of the requirements is that the financial institution must be
certain that the deposit amounts within the file have not been changed. Which of the following should be used to meet the requirement?
Which of the following should have been done first?
Joe an employee has reported to Ann a network technician an unusual device plugged into a USB port on a workstation in the call center. Ann unplugs the
workstation and brings it to the IT department where an incident is opened. Which of the following should have been done first?
Which of the following BEST describes this occurrence?
An organization receives an email that provides instruction on how to protect a system from being a target of new malware that is rapidly infecting systems. The
incident response team investigates the notification and determines it to invalid and notifies users to disregard the email. Which of the following BEST describes this
occurrence?
Which of the following technologies will enforce protec…
A government agency wants to ensure that the systems they use have been deployed as security as possible. Which of the following technologies will enforce
protections on these systems to prevent files and services from operating outside of a strict rule set?
Which of the following should be selected?
A forensics analyst is tasked identifying identical files on a hard drive. Due to the large number of files to be compared, the analyst must use an algorithm that is
known to have the lowest collision rate. Which of the following should be selected?
Which of the following concepts should be considered to…
Joe a system architect wants to implement appropriate solutions to secure the company’s distributed database. Which of the following concepts should be
considered to help ensure data security? (Select TWO)
Which of the following rules is necessary to support th…
A system administrator is implementing a firewall ACL to block specific communication to and from a predefined list of IP addresses, while allowing all other
communication. Which of the following rules is necessary to support this implementation?
Which of the following risk mitigation strategies would…
Ann a user has been promoted from a sales position to sales manager. Which of the following risk mitigation strategies would be MOST appropriate when a user
changes job roles?
The administrator concludes that this traffic is a(N):
When viewing IPS logs the administrator see systems all over the world scanning the network for servers with port 22 open. The administrator concludes that this
traffic is a(N):
Which of the following should the administrator use to …
An administrator wants to provide onboard hardware based cryptographic processing and secure key storage for full-disk encryption. Which of the following should
the administrator use to fulfill the requirements?