<< Prev Question Next Question >>

Question 98/124

Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (124q)
Question 1: After conducting a vulnerability scan, a systems administrat...
Question 2: A security analyst is reviewing alerts in the SIEM related t...
Question 3: A newly identified network access vulnerability has been fou...
Question 4: An engineer moved to another team and is unable to access th...
Question 5: Which of the following allows for the attribution of message...
Question 6: Which of the following describes the reason root cause analy...
Question 7: Which of the following security controls is most likely bein...
Question 8: An organization wants to ensure the integrity of compiled bi...
Question 9: An organization is struggling with scaling issues on its VPN...
Question 10: An administrator is reviewing a single server's security log...
Question 11: An enterprise is working with a third party and needs to all...
Question 12: Which of the following would be most useful in determining w...
Question 13: A security engineer needs to configure an NGFW to minimize t...
Question 14: Which of the following is used to add extra complexity befor...
Question 15: A software developer released a new application and is distr...
Question 16: Which of the following tools can assist with detecting an em...
Question 17: Which of the following exercises should an organization use ...
Question 18: A company decided to reduce the cost of its annual cyber ins...
Question 19: A business received a small grant to migrate its infrastruct...
Question 20: A healthcare organization wants to provide a web application...
Question 21: A software development manager wants to ensure the authentic...
Question 22: A systems administrator set up a perimeter firewall but cont...
Question 23: A network administrator is working on a project to deploy a ...
Question 24: Which of the following teams combines both offensive and def...
Question 25: A security analyst is investigating an alert that was produc...
Question 26: An analyst is evaluating the implementation of Zero Trust pr...
Question 27: A technician needs to apply a high-priority patch to a produ...
Question 28: After a recent vulnerability scan, a security engineer needs...
Question 29: A security operations center determines that the malicious a...
Question 30: The management team notices that new accounts that are set u...
Question 31: Which of the following security concepts is accomplished wit...
Question 32: During a penetration test, a vendor attempts to enter an una...
Question 33: An administrator was notified that a user logged in remotely...
Question 34: A small business uses kiosks on the sales floor to display p...
Question 35: After reviewing the following vulnerability scanning report:...
Question 36: A systems administrator is changing the password policy with...
Question 37: Which of the following is the best way to secure an on-site ...
Question 38: A certificate vendor notified a company that recently invali...
Question 39: Which of the following security concepts is the best reason ...
Question 40: An administrator discovers that some files on a database ser...
Question 41: While troubleshooting a firewall configuration, a technician...
Question 42: During a security incident, the security operations team ide...
Question 43: A security administrator would like to protect data on emplo...
Question 44: Which of the following security control types does an accept...
Question 45: A systems administrator is working on a defense-in-depth str...
Question 46: A company hired a consultant to perform an offensive securit...
Question 47: Which of the following can best protect against an employee ...
Question 48: An attacker posing as the Chief Executive Officer calls an e...
Question 49: An organization maintains intellectual property that it want...
Question 50: A security engineer is implementing FDE for all laptops in a...
Question 51: A security analyst is reviewing the following logs: (Exhibit...
Question 52: Which of the following must be considered when designing a h...
Question 53: A company is developing a business continuity strategy and n...
Question 54: A systems administrator works for a local hospital and needs...
Question 55: Which of the following is required for an organization to pr...
Question 56: Which of the following threat actors is the most likely to b...
Question 57: Which of the following describes a security alerting and mon...
Question 58: A security analyst receives alerts about an internal system ...
Question 59: A company has begun labeling all laptops with asset inventor...
Question 60: A manager receives an email that contains a link to receive ...
Question 61: The local administrator account for a company's VPN applianc...
Question 62: A Chief Information Security Officer (CISO) wants to explici...
Question 63: A newly appointed board member with cybersecurity knowledge ...
Question 64: A visitor plugs a laptop into a network jack in the lobby an...
Question 65: Which of the following should a systems administrator set up...
Question 66: Which of the following is most likely to be deployed to obta...
Question 67: An employee receives a text message from an unknown number c...
Question 68: A security manager created new documentation to use in respo...
Question 69: A company is discarding a classified storage array and hires...
Question 70: During the onboarding process, an employee needs to create a...
Question 71: Which of the following is the best reason to complete an aud...
Question 72: An organization disabled unneeded services and placed a fire...
Question 73: An employee receives a text message that appears to have bee...
Question 74: Which of the following is classified as high availability in...
Question 75: A company's end users are reporting that they are unable to ...
Question 76: Which of the following penetration testing teams is focused ...
Question 77: To improve the security at a data center, a security adminis...
Question 78: Which of the following is the most likely to be used to docu...
Question 79: Which of the following is most likely associated with introd...
Question 80: Which of the following most impacts an administrator's abili...
Question 81: Users at a company are reporting they are unable to access t...
Question 82: Which of the following is the most common data loss path for...
Question 83: A company is concerned about weather events causing damage t...
Question 84: Malware spread across a company's network after an employee ...
Question 85: A systems administrator would like to deploy a change to a p...
Question 86: Which of the following is the phase in the incident response...
Question 87: A company must ensure sensitive data at rest is rendered unr...
Question 88: Which of the following best practices gives administrators a...
Question 89: One of a company's vendors sent an analyst a security bullet...
Question 90: A systems administrator receives the following alert from a ...
Question 91: An organization is leveraging a VPN between its headquarters...
Question 92: A systems administrator is creating a script that would save...
Question 93: A systems administrator wants to prevent users from being ab...
Question 94: A security analyst and the management team are reviewing the...
Question 95: A company's legal department drafted sensitive documents in ...
Question 96: A security analyst scans a company's public network and disc...
Question 97: A company is planning to set up a SIEM system and assign an ...
Question 98: Security controls in a data center are being reviewed to ens...
Question 99: Which of the following risks can be mitigated by HTTP header...
Question 100: Which of the following would be best suited for constantly c...
Question 101: A company is decommissioning its physical servers and replac...
Question 102: A technician is deploying a new security camera. Which of th...
Question 103: Which of the following describes the maximum allowance of ac...
Question 104: Several employees received a fraudulent text message from so...
Question 105: An organization would like to store customer data on a separ...
Question 106: An IT manager informs the entire help desk staff that only t...
Question 107: A technician wants to improve the situational and environmen...
Question 108: Which of the following incident response activities ensures ...
Question 109: An administrator finds that all user workstations and server...
Question 110: An engineer needs to find a solution that creates an added l...
Question 111: Which of the following methods to secure credit card data is...
Question 112: A company is expanding its threat surface program and allowi...
Question 113: A cyber operations team informs a security analyst about a n...
Question 114: A security administrator is deploying a DLP solution to prev...
Question 115: A security administrator identifies an application that is s...
Question 116: An administrator finds that all user workstations and server...
Question 117: A company wants to verify that the software the company is d...
Question 118: Which of the following scenarios describes a possible busine...
Question 119: A security administrator is reissuing a former employee's la...
Question 120: A security team is reviewing the findings in a report that w...
Question 121: A company needs to provide administrative access to internal...
Question 122: After a security incident, a systems administrator asks the ...
Question 123: Which of the following are the most likely vectors for the u...
Question 124: Which of the following would be the best way to block unknow...