<< Prev Question Next Question >>

Question 5/145

A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent the exfiltration of data? (Select TWO).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (145q)
Question 1: During a routine scan of a wireless segment at a retail comp...
Question 2: A company wants to modify its current backup strategy to min...
Question 3: Which of the following would BEST identify and remediate a d...
Question 4: A large enterprise has moved all Hs data to the cloud behind...
Question 5: A technician needs to prevent data loss in a laboratory. The...
Question 6: A system administrator needs to implement an access control ...
Question 7: A security analyst is performing a forensic investigation co...
Question 8: An employee has been charged with fraud and is suspected of ...
Question 9: A document that appears to be malicious has been discovered ...
Question 10: A security analyst is running a vulnerability scan to check ...
Question 11: Which of the following is the purpose of a risk register?...
Question 12: A security analyst b concerned about traffic initiated to th...
Question 13: Which of the following terms should be included in a contrac...
Question 14: Local guidelines require that all information systems meet a...
Question 15: A web server administrator has redundant servers and needs t...
Question 16: The website http://companywebsite.com requires users to prov...
Question 17: Which of the following BEST describes a security exploit for...
Question 18: A company recently transitioned to a strictly BYOD culture d...
1 commentQuestion 19: A security administrator has noticed unusual activity occurr...
Question 20: During a security assessment, a security finds a file with o...
Question 21: A security analyst is reviewing a penetration-testing report...
Question 22: Which of the following should be put in place when negotiati...
Question 23: A security architect at a large, multinational organization ...
Question 24: Joe. a security analyst, recently performed a network discov...
Question 25: Which of the following would be the BEST method for creating...
Question 26: An organization recently recovered from a data breach. Durin...
Question 27: While reviewing the wireless router, the systems administrat...
Question 28: An engineer is setting up a VDI environment for a factory lo...
Question 29: A small business just recovered from a ransomware attack aga...
Question 30: A company's Chief Information Office (CIO) is meeting with t...
Question 31: A retail executive recently accepted a job with a major comp...
1 commentQuestion 32: Given the following logs: (Exhibit) Which of the following B...
Question 33: An organization's RPO for a critical system is two hours. Th...
Question 34: A company recently experienced an attack in which a maliciou...
Question 35: A Chief Security Officer (CSO) has asked a technician to dev...
Question 36: A malicious actor recently penetration a company's network a...
Question 37: A user must introduce a password and a USB key to authentica...
Question 38: A company is implementing a new SIEM to log and send alerts ...
1 commentQuestion 39: The concept of connecting a user account across the systems ...
Question 40: A network administrator is setting up wireless access points...
Question 41: A local coffee shop runs a small WiFi hot-spot for its custo...
Question 42: Select the appropriate attack and remediation from each drop...
Question 43: A company's help desk received several AV alerts indicating ...
Question 44: When implementing automation with loT devices, which of the ...
Question 45: A company was recently breached Part of the company's new cy...
Question 46: A cybersecurity administrator has a reduced team and needs t...
Question 47: A security administrator suspects there may be unnecessary s...
Question 48: Which of the following BEST describes a social-engineering a...
Question 49: To further secure a company's email system, an administrator...
Question 50: A company recently added a DR site and is redesigning the ne...
Question 51: A network administrator would like to configure a site-to-si...
Question 52: A security analyst receives the configuration of a current V...
Question 53: Under GDPR, which of the following is MOST responsible for t...
Question 54: A security analyst is investigating multiple hosts that are ...
Question 55: A company just implemented a new telework policy that allows...
Question 56: A financial institution would like to stare is customer data...
Question 57: Which of the following is a reason why an organization would...
Question 58: Employees are having issues accessing the company's website....
Question 59: A security administrator checks the table of a network switc...
Question 60: A new vulnerability in the SMB protocol on the Windows syste...
Question 61: An organization is having difficulty correlating events from...
Question 62: After a hardware incident, an unplanned emergency maintenanc...
Question 63: A database administrator needs to ensure all passwords are s...
Question 64: A company's Chief Information Security Officer (CISO) recent...
Question 65: During an incident response, a security analyst observes the...
Question 66: A company has limited storage available and online presence ...
Question 67: An organization's corporate offices were destroyed due to a ...
Question 68: Which of the following will provide the BEST physical securi...
Question 69: An organization is developing a plan in the event of a compl...
Question 70: The CSIRT is reviewing the lessons learned from a recent inc...
Question 71: A company uses wireless tor all laptops and keeps a very det...
Question 72: A researcher has been analyzing large data sets for the last...
Question 73: A root cause analysis reveals that a web application outage ...
Question 74: A company has been experiencing very brief power outages fro...
Question 75: An organization's help desk is flooded with phone calls from...
Question 76: A remote user recently took a two-week vacation abroad and b...
Question 77: A university is opening a facility in a location where there...
Question 78: An attacked is attempting to exploit users by creating a fak...
Question 79: Which of the following would be BEST to establish between or...
Question 80: A security analyst is configuring a large number of new comp...
Question 81: A manufacturing company has several one-off legacy informati...
Question 82: The human resources department of a large online retailer ha...
Question 83: A Chief Security Officer (CSO) was notified that a customer ...
Question 84: Company engineers regularly participate in a public Internet...
Question 85: Leveraging the information supplied below, complete the CSR ...
Question 86: A university with remote campuses, which all use different s...
Question 87: A user recently attended an exposition and received some dig...
Question 88: Which of the following often operates in a client-server arc...
Question 89: The facilities supervisor for a government agency is concern...
Question 90: A user contacts the help desk to report the following: Two d...
Question 91: Several employees return to work the day after attending an ...
Question 92: A forensics investigator is examining a number of unauthoriz...
Question 93: Which of the following is MOST likely to contain ranked and ...
Question 94: After consulting with the Chief Risk Officer (CRO). a manage...
Question 95: A retail company that is launching a new website to showcase...
Question 96: Following a prolonged datacenter outage that affected web-ba...
Question 97: Which of the following would be the BEST resource lor a soft...
Question 98: A host was infected with malware. During the incident respon...
Question 99: A user enters a password to log in to a workstation and is t...
Question 100: A security engineer needs to enhance MFA access to sensitive...
Question 101: A network analyst is setting up a wireless access point for ...
Question 102: An organization's Chief Security Officer (CSO) wants to vali...
Question 103: An end user reports a computer has been acting slower than n...
Question 104: Which of the following would be BEST for a technician to rev...
Question 105: An organization suffered an outage and a critical system too...
Question 106: A global pandemic is forcing a private organization to close...
Question 107: A security auditor is reviewing vulnerability scan data prov...
Question 108: Which of the following refers to applications and systems th...
Question 109: Which of the following organizational policies are MOST like...
Question 110: A company is launching a new internet platform for its clien...
Question 111: An organization recently acquired an ISO 27001 certification...
Question 112: A cybersecurity department purchased o new PAM solution. The...
Question 113: Which of the following technical controls is BEST suited for...
Question 114: Some laptops recently went missing from a locked storage are...
Question 115: A company recently moved sensitive videos between on-premise...
Question 116: Which of the following ISO standards is certified for privac...
Question 117: A security administrator is setting up a SIEM to help monito...
Question 118: A remote user recently took a two-week vacation abroad and b...
Question 119: An organization has decided to host its web application and ...
Question 120: Which of the following BEST explains the difference between ...
Question 121: Which of the following environments utilizes dummy data and ...
Question 122: A recently discovered zero-day exploit utilizes an unknown v...
Question 123: A company has discovered unauthorized devices are using its ...
Question 124: The Chief Financial Officer (CFO) of an insurance company re...
Question 125: A company is upgrading its wireless infrastructure to WPA2-E...
Question 126: Which of the following allows for functional test data to be...
Question 127: An auditor is performing an assessment of a security applian...
Question 128: Which of the following types of controls is a turnstile?...
Question 129: A company has drafted an insider-threat policy that prohibit...
Question 130: Which of the following is the MOST secure but LEAST expensiv...
Question 131: A security analyst has received an alert about being sent vi...
Question 132: A company has determined that if its computer-based manufact...
Question 133: A network administrator has been asked to design a solution ...
Question 134: A vulnerability assessment report will include the CVSS scor...
Question 135: A pharmaceutical sales representative logs on to a laptop an...
Question 136: The spread of misinformation surrounding the outbreak of a n...
Question 137: A multinational organization that offers web-based services ...
Question 138: A security assessment determines DES and 3DES at still being...
Question 139: An attacker was easily able to log in to a company's securit...
Question 140: n organization plans to transition the intrusion detection a...
Question 141: A security operations analyst is using the company's SIEM so...
Question 142: A recent security assessment revealed that an actor exploite...
Question 143: Which of the following BEST describes the MFA attribute that...
Question 144: A company recently experienced a data breach and the source ...
Question 145: An attacker is attempting to exploit users by creating a fak...