Which of the following job roles should receive training on forensics, chain of custody, and the order of vola
A security manager is preparing the training portion of an incident plan. Which of the following job roles
should receive training on forensics, chain of custody, and the order of volatility?
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest is calle
Virtualization that allows an operating system kernel to run multiple isolated instances of the guest is
called:
Which of the following is a proprietary protocol commonly used for router authentication across an enterprise?
Which of the following is a proprietary protocol commonly used for router authentication across an
enterprise?
Which of the following commands can be used to see processes that are listening on a TCP port?
While responding to an incident on a new Windows server, the administrator needs to disable unused
services. Which of the following commands can be used to see processes that are listening on a TCP port?
Which of the following settings must be configured?
A system administrator must configure the company’s authentication system to ensure that users will be
unable to reuse the last ten passwords within a six months period. Which of the following settings must
be configured? (Select Two)
Which of the following data transport?
An administrator requests a new VLAN be created to support the installation of a new SAN. Which of the
following data transport?
Which of the following access control methodologies provides an individual with the most restrictive access ri
Which of the following access control methodologies provides an individual with the most restrictive
access rights to successfully perform their authorized duties?
Which of the following should the administrator use to fulfil the requirements?
An administrator wants to provide onboard hardware based cryptographic processing and secure key
storage for full-disk encryption. Which of the following should the administrator use to fulfil the
requirements?
The administrator concludes that this traffic is a(N):
When viewing IPS logs the administrator see systems all over the world scanning the network for servers
with port 22 open. The administrator concludes that this traffic is a(N):
Which of the following risk mitigation strategies would be MOST appropriate when a user changes job roles?
Ann a user has been promoted from a sales position to sales manager. Which of the following risk
mitigation strategies would be MOST appropriate when a user changes job roles?