Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following allows a systems administrator to tune permissions for a file?

A.

Patching

B.

Access control list

C.

Configuration enforcement

D.

Least privilege

Which of the following are the best security controls for controlling on-premises access? (Select two.)

A.

Swipe card

B.

Picture ID

C.

Phone authentication application

D.

Biometric scanner

E.

Camera

F.

Memorable

Which of the following would help ensure a security analyst is able to accurately measure the overall risk to an organization when a new vulnerability is disclosed?

A.

A full inventory of all hardware and software

B.

Documentation of system classifications

C.

A list of system owners and their departments

D.

Third-party risk assessment documentation

Which of the following tasks is typically included in the BIA process?

A.

Estimating the recovery time of systems

B.

Identifying the communication strategy

C.

Evaluating the risk management plan

D.

Establishing the backup and recovery procedures

E.

Developing the incident response plan

An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?

A.

Business continuity

B.

Physical security

C.

Change management

D.

Disaster recovery

Which of the following provides resilience by hosting critical VMs within different IaaS providers while being maintained by internal application owners?

A.

Multicloud architectures

B.

SaaS provider diversity

C.

On-premises server load balancing

D.

Corporate-owned, off-site locations

An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario?

A.

Real-time recovery

B.

Hot

C.

Cold

D.

Warm

A company is concerned with supply chain compromise of new servers and wants to limit this risk. Which of the following should the company review first?

A.

Sanitization procedure

B.

Acquisition process

C.

Change management

D.

Asset tracking

Which of the following should an organization focus on the most when making decisions about vulnerability prioritization?

A.

Exposure factor

B.

CVSS

C.

CVE

D.

Industry impact

A security administrator recently reset local passwords and the following values were recorded in the system:

Which of the following in the security administrator most likely protecting against?

A.

Account sharing

B.

Weak password complexity

C.

Pass-the-hash attacks

D.

Password compromise

An administrator is Investigating an incident and discovers several users’ computers were Infected with malware after viewing files mat were shared with them. The administrator discovers no degraded performance in the infected machines and an examination of the log files does not show excessive failed logins. Which of the following attacks Is most likely the cause of the malware?

A.

Malicious flash drive

B.

Remote access Trojan

C.

Brute-forced password

D.

Cryptojacking

Which of the following should a systems administrator use to decrease the company's hardware attack surface?

A.

Replication

B.

Isolation

C.

Centralization

D.

Virtualization

The physical security team at a company receives reports that employees are not displaying their badges. The team also observes employees tailgating at controlled entrances. Which of the following topics will the security team most likely emphasize in upcoming security training?

A.

Social engineering

B.

Situational awareness

C.

Phishing

D.

Acceptable use policy

An employee from the accounting department logs in to the website used for processing the company's payments. After logging in, a new desktop application automatically downloads on the employee's computer and causes the computer to restart. Which of the following attacks has occurred?

A.

XSS

B.

Watering hole

C.

Typosquatting

D.

Buffer overflow

A security team is setting up a new environment for hosting the organization's on-premises software application as a cloud-based service. Which of the following should the team ensure is in place in order for the organization to follow security best practices?

A.

Visualization and isolation of resources

B.

Network segmentation

C.

Data encryption

D.

Strong authentication policies