Which of the following metrics is important for measuring the extent of data required during backup and recove
Which of the following metrics is important for measuring the extent of data required during backup and
recovery?
Which of the following can be used to ensure that sensitive records stored on a backend server can only be acc
Which of the following can be used to ensure that sensitive records stored on a backend server can only
be accessed by a front end server with the appropriate record key?
Which of the following would be used to allow a subset of traffic from a wireless network to an internal netwo
Which of the following would be used to allow a subset of traffic from a wireless network to an internal
network?
Which of the following Best describes this type of attack?
A company has identified a watering hole attack. Which of the following Best describes this type of
attack?
Which of the following is the MOST important the security manager must rely upon to help make this determinati
A security manager is discussing change in the security posture of the network, if a proposed application
is approved for deployment. Which of the following is the MOST important the security manager must
rely upon to help make this determination?
Which of the following would be BEST course of action?
Joe the system administrator has noticed an increase in network activity from outside sources. He wishes
to direct traffic to avoid possible penetration while heavily monitoring the traffic with little to no impact
on the current server load. Which of the following would be BEST course of action?
Which of the following should the administrator do to verify if this is indeed a false positive?
An assessment too reports that the company’s web server may be susceptible to remote buffer overflow.
The web server administrator insists that the finding is a false positive. Which of the following should the
administrator do to verify if this is indeed a false positive?
which of the following firewall rules would accomplish this objective?
The sales force in an organization frequently travel to remote sites and requires secure access to an
internal server with an IP address of 192.168.0.220. Assuming services are using default ports, which of
the following firewall rules would accomplish this objective? (Select Two)
Which of the following will provide data encryption, key management and secure application launching?
Which of the following will provide data encryption, key management and secure application launching?
which of the following?
It is MOST difficult to harden against which of the following?