Backup Storage Optimization
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary concern of the team during the restore process?

  • The backups will run out of space at the current rate (correct)
  • The backups are too small
  • The backups are not daily
  • The backups are not incremental
  • What type of backup would use the least amount of storage space for backups?

  • A weekly, full backup with daily snapshot backups
  • A weekly, incremental backup with daily differential backups
  • A weekly, full backup with daily incremental backups (correct)
  • A weekly, full backup with daily differential backups
  • What metadata would be part of the images if all the metadata is still intact?

  • When the Gle was deleted
  • The GPS location (correct)
  • The number of copies made
  • The total number of print jobs
  • Why can't the financial analyst open the encrypted email?

    <p>The S/MIME plug-in is not enabled</p> Signup and view all the answers

    What type of investigation involves analyzing images from a cellular phone?

    <p>Mobile device forensics investigation</p> Signup and view all the answers

    What is the purpose of running a forensics tool on the images?

    <p>To gather metadata</p> Signup and view all the answers

    What is the first step in generating a server certificate for 802.1X and secure RDP connections?

    <p>Generate a CSR</p> Signup and view all the answers

    What risk management strategy is involved in shifting from an in-house solution to a third-party SaaS provider for identity management?

    <p>Risk transference</p> Signup and view all the answers

    When deploying application patches, what is the best approach to ensure minimal disruption to production systems?

    <p>Apply patches to systems in a testing environment, then to systems in a staging environment, and finally to production systems</p> Signup and view all the answers

    What is the purpose of generating a CSR in the process of obtaining a server certificate?

    <p>To obtain a server certificate from a trusted Certificate Authority</p> Signup and view all the answers

    What is the main benefit of using a third-party SaaS provider for identity management?

    <p>Reduced maintenance costs</p> Signup and view all the answers

    What type of file is typically generated after obtaining a server certificate from a trusted Certificate Authority?

    <p>.pfx file</p> Signup and view all the answers

    What type of attack was most likely used by the third party to discover usernames and passwords?

    <p>DNS poisoning</p> Signup and view all the answers

    What is the recommended approach to create accounts for each region?

    <p>Create different accounts for each region, limit their logon times, and alert on risky logins.</p> Signup and view all the answers

    When updating a Grewall configuration, what should a technician do to prevent unreachable servers?

    <p>Test the policy in a non-production environment before enabling the policy in the production network.</p> Signup and view all the answers

    What was the IP address of the forged recruiting application website?

    <p>10.2.12.99</p> Signup and view all the answers

    What is the primary purpose of creating a guest wireless network at a coffee shop?

    <p>To segregate customer traffic from the coffee shop's internal network.</p> Signup and view all the answers

    Why did the DNS query logs show an incorrect IP address for the recruiting application website?

    <p>An attacker temporarily poisoned a name server.</p> Signup and view all the answers

    What should a technician do before adding a 'deny any' policy to an ACL?

    <p>Test the policy in a non-production environment before enabling the policy in the production network.</p> Signup and view all the answers

    What was the mechanism used by the attacker to redirect the user to the forged website?

    <p>DNS cache poisoning</p> Signup and view all the answers

    What was the actual IP address of the legitimate recruiting application website?

    <p>10.1.1.20</p> Signup and view all the answers

    What is the main benefit of limiting logon times for region-specific accounts?

    <p>It prevents unauthorized access during non-business hours.</p> Signup and view all the answers

    What type of attack did the security analyst NOT suspect?

    <p>Phishing attack</p> Signup and view all the answers

    What is the primary purpose of enforcing Kerberos authentication?

    <p>To provide an additional layer of authentication for region-specific accounts.</p> Signup and view all the answers

    What type of attack is most likely being detected when the Event Viewer displays 'Special privileges assigned to new logon' messages without a valid logon associated with the user?

    <p>Pass-the-hash</p> Signup and view all the answers

    What tactic would an attacker most likely use to target company engineers participating in a public Internet forum?

    <p>Watering-hole attack</p> Signup and view all the answers

    What is the primary concern of the CIO regarding the wireless network?

    <p>Unauthorized device access</p> Signup and view all the answers

    What is the most likely reason for keeping a detailed record of assets and authorized devices on the wireless network?

    <p>To prevent unauthorized access</p> Signup and view all the answers

    What is the potential impact of a script kiddie bruteforcing the wireless PSK?

    <p>Unauthorized access to the internal network</p> Signup and view all the answers

    What is the main goal of an attacker using a session replay attack?

    <p>To intercept and replay sensitive data</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser