<< Prev Question Next Question >>

Question 5/82

A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (82q)
Question 1: Management wishes to add another authentication factor in ad...
1 commentQuestion 2: A vulnerability scanner that uses its running service's acce...
Question 3: Which of the following should a security analyst perform FIR...
Question 4: An employee uses RDP to connect back to the office network. ...
Question 5: A systems administrator is attempting to recover from a cata...
Question 6: An administrator is replacing a wireless router. The configu...
Question 7: A security consultant discovers that an organization is usin...
Question 8: A software development company needs to share information be...
Question 9: Users in a corporation currently authenticate with a usernam...
Question 10: Which of the following would enhance the security of accessi...
Question 11: A security administrator returning from a short vacation rec...
Question 12: A company is investigating a data compromise where data exfi...
Question 13: A security analyst is testing both Windows and Linux systems...
Question 14: Upon entering an incorrect password, the logon screen displa...
Question 15: Two users must encrypt and transmit large amounts of data be...
Question 16: An employee in the finance department receives an email, whi...
Question 17: An attacker captures the encrypted communication between two...
Question 18: Joe, a salesman, was assigned to a new project that requires...
Question 19: The security administrator receives an email on a non-compan...
Question 20: A security engineer must install the same x.509 certificate ...
Question 21: A network operations manager has added a second row of serve...
Question 22: Refer to the following code: (Exhibit) Which of the followin...
Question 23: A technician must configure a firewall to block external DNS...
Question 24: Company A has acquired Company B. Company A has different do...
Question 25: Which of the following are the MAIN reasons why a systems ad...
Question 26: A customer calls a technician and needs to remotely connect ...
Question 27: Which of the following explains why vendors publish MD5 valu...
Question 28: A user receives an email from ISP indicating malicious traff...
Question 29: A technician has installed new vulnerability scanner softwar...
Question 30: Which of the following is the proper order for logging a use...
Question 31: Despite having implemented password policies, users continue...
Question 32: An organization has implemented an IPSec VPN access for remo...
Question 33: Malicious traffic from an internal network has been detected...
Question 34: Given the log output: Max 15 00:15:23.431 CRT: #SEC_LOGIN-5-...
Question 35: Legal authorities notify a company that its network has been...
Question 36: An organization has an account management policy that define...
Question 37: A company's AUP requires: * Passwords must meet complexity r...
Question 38: An incident involving a workstation that is potentially infe...
Question 39: A company wants to provide centralized authentication for it...
Question 40: A security administrator has been tasked with improving the ...
Question 41: Which of the following delineates why it is important to per...
Question 42: A newly purchased corporate WAP needs to be configured in th...
Question 43: When attackers use a compromised host as a platform for laun...
Question 44: Two users need to send each other emails over unsecured chan...
Question 45: A security administrator wants to implement a company-wide p...
Question 46: An analyst receives an alert from the SIEM showing an IP add...
Question 47: A systems administrator is installing a new server in a larg...
Question 48: A company's loss control department identifies theft as a re...
Question 49: A Chief Information Officer (CIO) drafts an agreement betwee...
Question 50: A security analyst receives an alert from a WAF with the fol...
Question 51: An organization's file server has been virtualized to reduce...
Question 52: In determining when it may be necessary to perform a credent...
Question 53: A security analyst wants to harden the company's VoIP PBX. T...
Question 54: A company is planning to encrypt the files in several sensit...
Question 55: A network technician is setting up a segmented network that ...
Question 56: A Security Officer on a military base needs to encrypt sever...
Question 57: Which of the following controls allows a security guard to p...
Question 58: Which of the following is the proper way to quantify the tot...
Question 59: A security analyst is hardening a server with the directory ...
Question 60: An organization is comparing and contrasting migration from ...
Question 61: Security administrators attempted corrective action after a ...
Question 62: Which of the following development models entails several it...
Question 63: An organization has determined it can tolerate a maximum of ...
Question 64: An organization is working with a cloud services provider to...
Question 65: A number of employees report that parts of an ERP applicatio...
Question 66: A security analyst is reviewing an assessment report that in...
Question 67: Attackers have been using revoked certificates for MITM atta...
Question 68: Which of the following is the BEST reason for salting a pass...
Question 69: A security administrator is developing controls for creating...
Question 70: A vice president at a manufacturing organization is concerne...
Question 71: A hacker has a packet capture that contains: (Exhibit) Which...
Question 72: A web developer improves client access to the company's REST...
Question 73: Company A agrees to provide perimeter protection, power, and...
Question 74: Which of the following is the summary of loss for a given ye...
Question 75: A systems administrator is attempting to recover from a cata...
Question 76: A copy of a highly confidential salary report was recently f...
Question 77: A security auditor is testing perimeter security in a buildi...
Question 78: Which of the following are used to increase the computing ti...
Question 79: Which of the following could help detect trespassers in a se...
Question 80: Joe, a user, has been trying to send Ann, a different user, ...
Question 81: A network administrator is attempting to troubleshoot an iss...
Question 82: A security administrator has written a script that will auto...