Backup Storage Optimization
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary concern of the team during the restore process?

  • The backups will run out of space at the current rate (correct)
  • The backups are too small
  • The backups are not daily
  • The backups are not incremental

What type of backup would use the least amount of storage space for backups?

  • A weekly, full backup with daily snapshot backups
  • A weekly, incremental backup with daily differential backups
  • A weekly, full backup with daily incremental backups (correct)
  • A weekly, full backup with daily differential backups

What metadata would be part of the images if all the metadata is still intact?

  • When the Gle was deleted
  • The GPS location (correct)
  • The number of copies made
  • The total number of print jobs

Why can't the financial analyst open the encrypted email?

<p>The S/MIME plug-in is not enabled (C)</p> Signup and view all the answers

What type of investigation involves analyzing images from a cellular phone?

<p>Mobile device forensics investigation (A)</p> Signup and view all the answers

What is the purpose of running a forensics tool on the images?

<p>To gather metadata (D)</p> Signup and view all the answers

What is the first step in generating a server certificate for 802.1X and secure RDP connections?

<p>Generate a CSR (B)</p> Signup and view all the answers

What risk management strategy is involved in shifting from an in-house solution to a third-party SaaS provider for identity management?

<p>Risk transference (A)</p> Signup and view all the answers

When deploying application patches, what is the best approach to ensure minimal disruption to production systems?

<p>Apply patches to systems in a testing environment, then to systems in a staging environment, and finally to production systems (A)</p> Signup and view all the answers

What is the purpose of generating a CSR in the process of obtaining a server certificate?

<p>To obtain a server certificate from a trusted Certificate Authority (B)</p> Signup and view all the answers

What is the main benefit of using a third-party SaaS provider for identity management?

<p>Reduced maintenance costs (B)</p> Signup and view all the answers

What type of file is typically generated after obtaining a server certificate from a trusted Certificate Authority?

<p>.pfx file (C)</p> Signup and view all the answers

What type of attack was most likely used by the third party to discover usernames and passwords?

<p>DNS poisoning (C)</p> Signup and view all the answers

What is the recommended approach to create accounts for each region?

<p>Create different accounts for each region, limit their logon times, and alert on risky logins. (A)</p> Signup and view all the answers

When updating a Grewall configuration, what should a technician do to prevent unreachable servers?

<p>Test the policy in a non-production environment before enabling the policy in the production network. (A)</p> Signup and view all the answers

What was the IP address of the forged recruiting application website?

<p>10.2.12.99 (B)</p> Signup and view all the answers

What is the primary purpose of creating a guest wireless network at a coffee shop?

<p>To segregate customer traffic from the coffee shop's internal network. (B)</p> Signup and view all the answers

Why did the DNS query logs show an incorrect IP address for the recruiting application website?

<p>An attacker temporarily poisoned a name server. (C)</p> Signup and view all the answers

What should a technician do before adding a 'deny any' policy to an ACL?

<p>Test the policy in a non-production environment before enabling the policy in the production network. (D)</p> Signup and view all the answers

What was the mechanism used by the attacker to redirect the user to the forged website?

<p>DNS cache poisoning (D)</p> Signup and view all the answers

What was the actual IP address of the legitimate recruiting application website?

<p>10.1.1.20 (D)</p> Signup and view all the answers

What is the main benefit of limiting logon times for region-specific accounts?

<p>It prevents unauthorized access during non-business hours. (A)</p> Signup and view all the answers

What type of attack did the security analyst NOT suspect?

<p>Phishing attack (D)</p> Signup and view all the answers

What is the primary purpose of enforcing Kerberos authentication?

<p>To provide an additional layer of authentication for region-specific accounts. (C)</p> Signup and view all the answers

What type of attack is most likely being detected when the Event Viewer displays 'Special privileges assigned to new logon' messages without a valid logon associated with the user?

<p>Pass-the-hash (D)</p> Signup and view all the answers

What tactic would an attacker most likely use to target company engineers participating in a public Internet forum?

<p>Watering-hole attack (A)</p> Signup and view all the answers

What is the primary concern of the CIO regarding the wireless network?

<p>Unauthorized device access (A)</p> Signup and view all the answers

What is the most likely reason for keeping a detailed record of assets and authorized devices on the wireless network?

<p>To prevent unauthorized access (C)</p> Signup and view all the answers

What is the potential impact of a script kiddie bruteforcing the wireless PSK?

<p>Unauthorized access to the internal network (D)</p> Signup and view all the answers

What is the main goal of an attacker using a session replay attack?

<p>To intercept and replay sensitive data (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser