<< Prev Question Next Question >>

Question 159/232

A security analyst is performing a BIA.
The analyst notes that in a disaster, failover systems must be up and running within 30 minutes. The failover systems must use backup data that is no older than one hour. Which of the following should the analyst include in the business continuity plan?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (232q)
Question 1: Which of the following attacks can be used to exploit a vuln...
Question 2: An organization is looking to build its second head office i...
Question 3: A system in the network is used to store proprietary secrets...
Question 4: A Security analyst has received an alert about PII being sen...
Question 5: A manufacturing company updates a policy that instructs empl...
Question 6: An organization's IRP prioritizes containment over eradicati...
Question 7: Which of the following implements a lossy algorithm?...
Question 8: Which of the following should a company require prior to per...
Question 9: An organization is updating its access control standards for...
Question 10: A company help desk as received several reports that employe...
Question 11: An organization has the following written policies: Users mu...
Question 12: A company uses WPA2-PSK, and it appears there are multiple u...
Question 13: An organization's policy requires users to create passwords ...
Question 14: Confidential corporate data was recently stolen by an attack...
Question 15: A network administrator was provided the following output fr...
Question 16: A company recently contracted a penetration testing firm to ...
Question 17: A company notices that at 10 a.m. every Thursday, three user...
Question 18: A state-sponsored threat actor has launched several successf...
Question 19: When choosing a hashing algorithm for storing passwords in a...
Question 20: After segmenting the network, the network manager wants to c...
Question 21: A systems administrator is configuring a new network switch ...
Question 22: An organization has decided to host its web application and ...
Question 23: A Chief Security Officer (CSO) has implemented a policy to p...
Question 24: During the penetration testing of an organization, the teste...
Question 25: Proprietary information was sent by an employee to a distrib...
Question 26: A company has a backup site with equipment on site without a...
Question 27: Which of the following is the MOST likely motivation for a s...
Question 28: A technician needs lo document which application versions ar...
Question 29: A network technician discovered the usernames and passwords ...
Question 30: A Chief Information Officer (CIO) wants to eliminate the num...
Question 31: A company recently changed its security policy to allow acce...
Question 32: A law office has been leasing dark fiber from a local teleco...
Question 33: A security analyst is investigating a call from a user regar...
Question 34: Which of the following BEST describes the concept of perfect...
Question 35: A Chief Executive Officer (CEO) is staying at a hotel during...
Question 36: A company is performing an analysis of which corporate units...
Question 37: You have been tasked with designing a security plan for your...
Question 38: An Organization wants to separate permissions for individual...
Question 39: An organization is concerned that Its hosted web servers are...
Question 40: A new PKI is being built at a company, but the network admin...
Question 41: A company wants to provide a guest wireless system for its v...
Question 42: A technician has been asked to document which services are r...
Question 43: A recent audit uncovered a key finding regarding the use of ...
Question 44: A developer is creating a new web application on a public cl...
Question 45: A red team initiated a DoS attack on the management interfac...
Question 46: A credentialed vulnerability scan is often preferred over a ...
Question 47: As a security measure, an organization has disabled all exte...
Question 48: A security analyst is emailing PII in a spreadsheet file to ...
Question 49: A company recently implemented a new security system. In the...
Question 50: A company has drafted an Insider-threat policy that prohibit...
Question 51: An organization has hired a security analyst to perform a pe...
Question 52: Users are attempting to access a company's website but are t...
Question 53: In a lessons learned report, it is suspected that a well-org...
Question 54: A systems developer needs to provide machine-to-machine inte...
Question 55: An attacker has recently compromised an executives laptop an...
Question 56: An administrator is setting up automated remote file transfe...
Question 57: A retail executive recently accepted a job with a major comp...
Question 58: After patching computers with the latest application securit...
Question 59: An analyst is concerned about data leaks and wants to restri...
Question 60: A company that processes sensitive information has implement...
Question 61: A buffer overflow can result in:...
Question 62: An Organization requires secure configuration baselines for ...
Question 63: A systems administrator is installing and configuring an app...
Question 64: A coffee company has hired an IT consultant to set up a WiFi...
Question 65: A company has won an important government contract. Several ...
Question 66: Employees receive a benefits enrollment email from the compa...
Question 67: An organization has the following password policies: * Passw...
Question 68: A company has forbidden the use of external media within its...
Question 69: During an audit, the auditor requests to see a copy of the i...
Question 70: A company recently experienced data exfiltration via the cor...
Question 71: A company is determining where to host a hot site, and one o...
Question 72: If a current private key is compromised, which of the follow...
Question 73: Which of the following types of vulnerability scans typicall...
Question 74: The Chief information Officer (CIO) has decided to add two-f...
Question 75: An attacker is attempting to harvest user credentials on a c...
Question 76: Which of the following access management concepts is MOST cl...
Question 77: A corporation with 35,000 employees replaces its staff lapto...
Question 78: When a malicious user is able to retrieve sensitive informat...
Question 79: Which of the following would have the GREATEST impact on the...
Question 80: An organization was recently compromised by an attacker who ...
Question 81: An attacker has gained control of several systems on the Int...
Question 82: Which of the following is the proper use of a Faraday cage?...
Question 83: A security engineer wants to add SSL to the public web serve...
Question 84: A security administrator begins assessing a network with sof...
Question 85: Which of the following is the BEST example of a reputation i...
Question 86: A systems engineer is configuring a wireless network. The ne...
Question 87: A company recently added a DR site and is redesigning the ne...
Question 88: A security team received reports of increased latency on a h...
Question 89: Which of the following BEST explains how the use of configur...
Question 90: An attachment that was emailed to finance employees containe...
Question 91: A security administrator suspects there may be unnecessary s...
Question 92: A security administrator in a bank is required to enforce an...
Question 93: While reviewing system logs, a security analyst notices that...
Question 94: Which of the following documents would provide specific guid...
Question 95: A systems administrator is increasing the security settings ...
Question 96: A user received an SMS on a mobile phone that asked for bank...
Question 97: A user attempts to send an email to an external domain and q...
Question 98: A security consultant was asked to revise the security basel...
Question 99: After discovering a security incident and removing the affec...
Question 100: Which of the following may indicate a configuration item has...
Question 101: A company is deploying a wireless network. It is a requireme...
Question 102: During an incident, a company's CIRT determines it is necess...
Question 103: Which of the following can be used to increase the time need...
Question 104: A technician wants to configure a wireless router at a small...
Question 105: An employee opens a web browser and types a URL into the add...
Question 106: A security administrator is investigating a report that a us...
Question 107: A government contracting company Issues smartphones lo emplo...
Question 108: While testing a new application, a developer discovers that ...
Question 109: Which of the following is a benefit of credentialed vulnerab...
Question 110: A company has users and printers in multiple geographic loca...
Question 111: Management wants to ensure any sensitive data on company-pro...
Question 112: Using an ROT13 cipher to protocol confidential information f...
Question 113: An organization discovers that unauthorized applications hav...
Question 114: An organization wishes to allow its users to select devices ...
Question 115: Which of the following often operates in a client-server arc...
Question 116: A company uses an enterprise desktop imaging solution to man...
Question 117: A security engineer wants to further secure a sensitive VLAN...
Question 118: A security engineer wants to further secure a sensitive VLAN...
Question 119: The help desk received a call from a user who was trying to ...
Question 120: An administrator needs to protect rive websites with SSL cer...
Question 121: When building a hosted datacenter, which of the following is...
Question 122: While reviewing the wireless router, the systems administrat...
Question 123: In the event of a security incident, which of the following ...
Question 124: Ann, a new employee, received an email from an unknown sourc...
Question 125: The network information for a workstation is as follows: (Ex...
Question 126: A security analyst is performing a manual audit of captured ...
Question 127: While monitoring the SIEM, a security analyst observes traff...
Question 128: Joe, a contractor, is hired by a firm to perform a penetrati...
Question 129: A security analyst has recently deployed an MDM solution tha...
Question 130: A security analyst has received several reports of an issue ...
Question 131: Which of the following is a security consideration for IoT d...
Question 132: A security analyst is specifying requirements for a wireless...
Question 133: In highly secure environments where the risk of malicious ac...
Question 134: During certain vulnerability scanning scenarios, It is possi...
Question 135: A newly purchased corporate WAP needs to be configured in th...
Question 136: Which of the following policies would help an organization i...
Question 137: A technician wants to add wireless guest capabilities to an ...
Question 138: A researcher has been analyzing large data sets for the last...
Question 139: An administrator is disposing of media that contains sensiti...
Question 140: Which of the following implements a stream cipher?...
Question 141: The security office has had reports of increased tailgating ...
Question 142: During certain vulnerability scanning scenarios, it is possi...
Question 143: A security analyst wants to verify that a client-server (non...
Question 144: A company recently experienced a security breach. The securi...
Question 145: A systems administrator wants to replace the process of usin...
Question 146: Which of the following is the purpose of an industry-standar...
Question 147: A systems administrator is implementing a remote access meth...
Question 148: An administrator needs to protect five websites with SSL cer...
Question 149: A company has users and porters in multiple geographic locat...
Question 150: When choosing a hashing algorithm for storing passwords in a...
Question 151: An Organization requires secure configuration baselines for ...
Question 152: Which of the following security controls BEST mitigates soci...
Question 153: A security administrator has been conducting an account perm...
Question 154: A data owner has been tasked with assigning proper data clas...
Question 155: Which of the following BEST explains the reason why a server...
Question 156: Which of the following attacks is used to capture the WPA2 h...
Question 157: A systems administrator wants to enforce the use of HTTPS on...
Question 158: The director of information security at a company has recent...
Question 159: A security analyst is performing a BIA. The analyst notes th...
Question 160: Given the following output: Which of the following BEST desc...
Question 161: A security analyst received an after-hours alert indicating ...
Question 162: Which of the following enables a corporation to extend local...
Question 163: A vulnerability assessment report will include the CVSS scor...
Question 164: A company wants to deploy PKI on its Internet-facing website...
Question 165: Which of the following describes the ability of code to targ...
Question 166: A technician is implementing 802 1X with dynamic VLAN assign...
Question 167: A security professional wants to test a piece of malware tha...
Question 168: An organization has hired a new remote workforce. Many new e...
Question 169: A company's MOM policy outlines the following requirements: ...
Question 170: A security administrator wants to better prepare the inciden...
Question 171: An organization has created a review process to determine ho...
Question 172: A technician is required to configure updates on a guest ope...
Question 173: A company has had a BYOD policy in place for many years and ...
Question 174: A user from the financial aid office is having trouble inter...
Question 175: Company engineers regularly participate in a public Internet...
Question 176: A systems administrator is auditing the company's Active Dir...
Question 177: A dumpster diver was able 10 retrieve hard drives from a com...
Question 178: A pass-the-hash attack is commonly used to:...
Question 179: Which of the following concepts ensure ACL rules on a direct...
Question 180: An organization uses simulated phishing attacks on its users...
Question 181: An IT manager is estimating the mobile device budget for the...
Question 182: Which of the following types of security testing is the MOST...
Question 183: A software development company needs to augment staff by hir...
Question 184: During a network assessment a security analyst identifies th...
Question 185: A Chief Information Officer (CIO) is concerned that encrypti...
Question 186: An engineer is configuring a wireless network using PEAP for...
Question 187: A NIPS administrator needs to install a new signature to obs...
Question 188: After a systems administrator installed and configured Kerbe...
Question 189: Exercising various programming responses for the purpose of ...
Question 190: A company uses WPA2-PSK, and it appears there are multiple u...
Question 191: If two employees are encrypting traffic between them using a...
Question 192: A security engineer is setting up passwordless authenticatio...
Question 193: A systems administrator wants to implement a secure wireless...
Question 194: Which of the following provides the ability to attest to the...
Question 195: A large Industrial system's smart generator monitors the sys...
Question 196: Which of the following systems, if compromised, may cause gr...
Question 197: A security administrator has been conducting an account perm...
Question 198: The web platform team is deploying a new web application Dur...
Question 199: Which of the following types of attack is being used when an...
Question 200: A Chief Information Security Officer (CISO) for a school dis...
Question 201: Which of the following penetration testing concepts is an at...
Question 202: A coffee company, which operates a chain of stores across a ...
Question 203: Which of the following represents a multifactor authenticati...
Question 204: A security administrator needs to conduct a full inventory o...
Question 205: After running an online password cracking tool, an attacker ...
Question 206: A network administrator is setting up wireless access points...
Question 207: Which of the following BEST describes a security exploit for...
Question 208: A security analyst investigate a report from an employee in ...
Question 209: A security analyst is determining the point of compromise af...
Question 210: An administrator is beginning an authorized penetration test...
Question 211: A systems administrator just issued the ssh-keygen -t rsa co...
Question 212: A company recently experienced a network security breach and...
Question 213: A systems administrator has installed a new UTM that is capa...
Question 214: Which of the following impacts MOST likely results from poor...
Question 215: A security engineer needs to obtain a recurring log of chang...
Question 216: An incident response analyst at a large corporation is revie...
Question 217: Which of the following threat actors is motivated primarily ...
Question 218: A transitive trust:
Question 219: A company utilizes 802.11 for all client connectivity within...
Question 220: A company is performing an analysis of the corporate enterpr...
Question 221: The website of a bank that an organization does business wit...
Question 222: A security administrator has been tasked with implementing c...
Question 223: As a security measure, an organization has disabled all exte...
Question 224: Which of the following would MOST likely support the integri...
Question 225: A coding error has been discovered on a customer-facing webs...
Question 226: A user is unable to obtain an IP address from the corporate ...
Question 227: A first responder needs to collect digital evidence from a c...
Question 228: A company recently experienced a security breach. The securi...
Question 229: Which of the following impacts MOST likely result from poor ...
Question 230: Which of the following generates reports that show the numbe...
Question 231: Which of the following implements two-factor authentication ...
Question 232: A technician is investigating a report of unusual behavior a...