Podcast
Questions and Answers
Which of the following methods would BEST support the organization's focus on resiliency and uptime when expanding the data center? (Select TWO)
Which of the following methods would BEST support the organization's focus on resiliency and uptime when expanding the data center? (Select TWO)
Which of the following deterrent controls would BEST meet the objective of increasing security in a server room?
Which of the following deterrent controls would BEST meet the objective of increasing security in a server room?
Of the following choices, which one uses multifactor authentication?
Of the following choices, which one uses multifactor authentication?
What action can prevent an attacker from entering the data center after normal working hours and stealing sensitive data?
What action can prevent an attacker from entering the data center after normal working hours and stealing sensitive data?
Signup and view all the answers
To confirm suspicions of a password spraying attack against a Linux server, what is the BEST method to use?
To confirm suspicions of a password spraying attack against a Linux server, what is the BEST method to use?
Signup and view all the answers
In a network with multiple servers, what provides the BEST solution for aggregating and correlating logs from these servers?
In a network with multiple servers, what provides the BEST solution for aggregating and correlating logs from these servers?
Signup and view all the answers
Which action would be the BEST to prevent a self-propagating attack on a SQL database server in the future?
Which action would be the BEST to prevent a self-propagating attack on a SQL database server in the future?
Signup and view all the answers
Which type of attack will be thwarted by having account lockout policies in place?
Which type of attack will be thwarted by having account lockout policies in place?
Signup and view all the answers
Lisa wants to implement a secure authentication system on a website without storing user passwords. Which choice is the BEST for this goal?
Lisa wants to implement a secure authentication system on a website without storing user passwords. Which choice is the BEST for this goal?
Signup and view all the answers