Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is the best safeguard to protect against an extended power failure?

A.

Off-site backups

B.

Batteries

C.

Uninterruptible power supplies

D.

Generators

An IT administrator needs to ensure data retention standards are implemented on an enterprise application. Which of the following describes the administrator's role?

A.

Processor

B.

Custodian

C.

Privacy officer

D.

Owner

Which of the following objectives is best achieved by a tabletop exercise?

A.

Familiarizing participants with the incident response process

B.

Deciding red and blue team rules of engagement

C.

Quickly determining the impact of an actual security breach

D.

Conducting multiple security investigations in parallel

A systems administrator notices that the research and development department is not using the company VPN when accessing various company-related services and systems. Which of the following scenarios describes this activity?

A.

Espionage

B.

Data exfiltration

C.

Nation-state attack

D.

Shadow IT

A remote employee navigates to a shopping website on their company-owned computer. The employee clicks a link that contains a malicious file. Which of the following would prevent this file from downloading?

A.

DLP

B.

FIM

C.

NAC

D.

EDR

A systems administrator is redesigning now devices will perform network authentication. The following requirements need to be met:

• An existing Internal certificate must be used.

• Wired and wireless networks must be supported

• Any unapproved device should be Isolated in a quarantine subnet

• Approved devices should be updated before accessing resources

Which of the following would best meet the requirements?

A.

802.IX

B.

EAP

C.

RADIUS

D.

WPA2

An organization wants to deploy software in a container environment to increase security. Which of the following will limit the organization's ability to achieve this goal?

A.

Regulatory compliance

B.

Patch availability

C.

Kernel version

D.

Monolithic code

Which of the following exercises should an organization use to improve its incident response process?

A.

Tabletop

B.

Replication

C.

Failover

D.

Recovery

A security team installs an IPS on an organization's network and needs to configure the system to detect and prevent specific network attacks. Which of the following settings should the team configure first within the IPS?

A.

Allow list policies

B.

Packet Inspection

C.

Logging and reporting

D.

Firewall rules

A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?

A.

Secure cookies

B.

Version control

C.

Input validation

D.

Code signing

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

A.

Public key infrastructure

B.

Open public ledger

C.

Public key encryption

D.

Key escrow

A systems administrator creates a script that validates OS version, patch levels, and installed applications when users log in. Which of the following examples best describes the purpose of this script?

A.

Resource scaling

B.

Policy enumeration

C.

Baseline enforcement

D.

Guardrails implementation

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks.

Which of the following analysis elements did the company most likely use in making this decision?

A.

IMTTR

B.

RTO

C.

ARO

D.

MTBF

A spoofed identity was detected for a digital certificate. Which of the following are the type of unidentified key and the certificate mat could be in use on the company domain?

A.

Private key and root certificate

B.

Public key and expired certificate

C.

Private key and self-signed certificate

D.

Public key and wildcard certificate

Which of the following technologies can achieve microsegmentation?

A.

Next-generation firewalls

B.

Software-defined networking

C.

Embedded systems

D.

Air-gapped