Podcast
Questions and Answers
Which of the following methods would BEST support the organization's focus on resiliency and uptime when expanding the data center? (Select TWO)
Which of the following methods would BEST support the organization's focus on resiliency and uptime when expanding the data center? (Select TWO)
- UPS (correct)
- Data encryption
- NIC teaming
- Cold site
Which of the following deterrent controls would BEST meet the objective of increasing security in a server room?
Which of the following deterrent controls would BEST meet the objective of increasing security in a server room?
- A vulnerability assessment
- Backups
- Data encryption
- Signs warning intruders of monitoring (correct)
Of the following choices, which one uses multifactor authentication?
Of the following choices, which one uses multifactor authentication?
- A system that requires users to have a smart card and a PIN (correct)
- A cipher door lock that requires employees to enter a code
- A system that requires users to enter a username and password
- A system that checks an employee’s fingerprint and a vein scan
What action can prevent an attacker from entering the data center after normal working hours and stealing sensitive data?
What action can prevent an attacker from entering the data center after normal working hours and stealing sensitive data?
To confirm suspicions of a password spraying attack against a Linux server, what is the BEST method to use?
To confirm suspicions of a password spraying attack against a Linux server, what is the BEST method to use?
In a network with multiple servers, what provides the BEST solution for aggregating and correlating logs from these servers?
In a network with multiple servers, what provides the BEST solution for aggregating and correlating logs from these servers?
Which action would be the BEST to prevent a self-propagating attack on a SQL database server in the future?
Which action would be the BEST to prevent a self-propagating attack on a SQL database server in the future?
Which type of attack will be thwarted by having account lockout policies in place?
Which type of attack will be thwarted by having account lockout policies in place?
Lisa wants to implement a secure authentication system on a website without storing user passwords. Which choice is the BEST for this goal?
Lisa wants to implement a secure authentication system on a website without storing user passwords. Which choice is the BEST for this goal?