Backup Storage Optimization

EvocativeSupernova avatar
EvocativeSupernova
·
·
Download

Start Quiz

Study Flashcards

30 Questions

What is the primary concern of the team during the restore process?

The backups will run out of space at the current rate

What type of backup would use the least amount of storage space for backups?

A weekly, full backup with daily incremental backups

What metadata would be part of the images if all the metadata is still intact?

The GPS location

Why can't the financial analyst open the encrypted email?

The S/MIME plug-in is not enabled

What type of investigation involves analyzing images from a cellular phone?

Mobile device forensics investigation

What is the purpose of running a forensics tool on the images?

To gather metadata

What is the first step in generating a server certificate for 802.1X and secure RDP connections?

Generate a CSR

What risk management strategy is involved in shifting from an in-house solution to a third-party SaaS provider for identity management?

Risk transference

When deploying application patches, what is the best approach to ensure minimal disruption to production systems?

Apply patches to systems in a testing environment, then to systems in a staging environment, and finally to production systems

What is the purpose of generating a CSR in the process of obtaining a server certificate?

To obtain a server certificate from a trusted Certificate Authority

What is the main benefit of using a third-party SaaS provider for identity management?

Reduced maintenance costs

What type of file is typically generated after obtaining a server certificate from a trusted Certificate Authority?

.pfx file

What type of attack was most likely used by the third party to discover usernames and passwords?

DNS poisoning

What is the recommended approach to create accounts for each region?

Create different accounts for each region, limit their logon times, and alert on risky logins.

When updating a Grewall configuration, what should a technician do to prevent unreachable servers?

Test the policy in a non-production environment before enabling the policy in the production network.

What was the IP address of the forged recruiting application website?

10.2.12.99

What is the primary purpose of creating a guest wireless network at a coffee shop?

To segregate customer traffic from the coffee shop's internal network.

Why did the DNS query logs show an incorrect IP address for the recruiting application website?

An attacker temporarily poisoned a name server.

What should a technician do before adding a 'deny any' policy to an ACL?

Test the policy in a non-production environment before enabling the policy in the production network.

What was the mechanism used by the attacker to redirect the user to the forged website?

DNS cache poisoning

What was the actual IP address of the legitimate recruiting application website?

10.1.1.20

What is the main benefit of limiting logon times for region-specific accounts?

It prevents unauthorized access during non-business hours.

What type of attack did the security analyst NOT suspect?

Phishing attack

What is the primary purpose of enforcing Kerberos authentication?

To provide an additional layer of authentication for region-specific accounts.

What type of attack is most likely being detected when the Event Viewer displays 'Special privileges assigned to new logon' messages without a valid logon associated with the user?

Pass-the-hash

What tactic would an attacker most likely use to target company engineers participating in a public Internet forum?

Watering-hole attack

What is the primary concern of the CIO regarding the wireless network?

Unauthorized device access

What is the most likely reason for keeping a detailed record of assets and authorized devices on the wireless network?

To prevent unauthorized access

What is the potential impact of a script kiddie bruteforcing the wireless PSK?

Unauthorized access to the internal network

What is the main goal of an attacker using a session replay attack?

To intercept and replay sensitive data

Identify the most efficient backup strategy to minimize storage space usage. Given a daily full backup, which approach would use the least amount of storage space? Choose the best option from the provided alternatives.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Disaster Recovery Planning
10 questions
Data Backup and Recovery
10 questions

Data Backup and Recovery

BrilliantPlutonium avatar
BrilliantPlutonium
Use Quizgecko on...
Browser
Browser