Podcast
Questions and Answers
Which of the following would best enable a systems administrator to easily determine which
devices are located at a remote facility and allow policy to be pushed to only those devices?
Which of the following would best enable a systems administrator to easily determine which devices are located at a remote facility and allow policy to be pushed to only those devices?
A new company wants to avoid channel interference when building a WLAN. The company needs
to know the radio frequency behavior, identify dead zones, and determine the best place for
access points. Which of the following should be done first?
A new company wants to avoid channel interference when building a WLAN. The company needs to know the radio frequency behavior, identify dead zones, and determine the best place for access points. Which of the following should be done first?
Which of the following best describes a legal hold?
Which of the following best describes a legal hold?
A recent malware outbreak across a subnet included successful rootkit installations on many PCs,
ensuring persistence by rendering remediation efforts ineffective. Which of the following would
best detect the presence of a rootkit in the future?
A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?
Signup and view all the answers
In a rush to meet an end-of-year business goal, the IT department was told to implement a new
business application. The security engineer reviews the attributes of the application and decides
the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which
of the following BEST describes the security engineer's response?
In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer's response?
Signup and view all the answers
A systems administrator is considering switching from tape backup to an alternative backup
solution that would allow data to be readily available in the event of a disaster. Which of the
following backup types should the administrator implement?
A systems administrator is considering switching from tape backup to an alternative backup solution that would allow data to be readily available in the event of a disaster. Which of the following backup types should the administrator implement?
Signup and view all the answers
A data administrator is configuring authentication for a SaaS application and would like to reduce
the number of credentials employees need to maintain. The company prefers to use domain
credentials to access new SaaS applications. Which of the following methods would allow this
functionality?
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?
Signup and view all the answers
Which of the following is a reason why a forensic specialist would create a plan to preserve data
after an incident and prioritize the sequence for performing forensic analysis?
Which of the following is a reason why a forensic specialist would create a plan to preserve data after an incident and prioritize the sequence for performing forensic analysis?
Signup and view all the answers
A server administrator is reporting performance issues when accessing all internal resources.
Upon further investigation, the security team notices the following:
• A user's endpoint has been compromised and is broadcasting its MAC as the default gateway's
MAC throughout the LAN.• Traffic to and from that endpoint is significantly greater than all other
similar endpoints on the LAN.• Network ports on the LAN are not properly configured.• Wired
traffic is not being encrypted properly.
Which of the following attacks is most likely occurring?
A server administrator is reporting performance issues when accessing all internal resources. Upon further investigation, the security team notices the following: • A user's endpoint has been compromised and is broadcasting its MAC as the default gateway's MAC throughout the LAN.• Traffic to and from that endpoint is significantly greater than all other similar endpoints on the LAN.• Network ports on the LAN are not properly configured.• Wired traffic is not being encrypted properly. Which of the following attacks is most likely occurring?
Signup and view all the answers
An employee recently resigned from a company. The employee was responsible for managing
and supporting weekly batch jobs over the past five years. A few weeks after the employee
resigned, one of the batch jobs failed and caused a major disruption. Which of the following
would work best to prevent this type of incident from reoccurring?
An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?
Signup and view all the answers
Study Notes
Determining Device Locations
- A systems administrator can use a device's location to determine which devices are at a remote facility and push policy to only those devices.
WLAN Planning
- To avoid channel interference when building a WLAN, it's essential to know the radio frequency behavior and identify dead zones to determine the best place for access points.
Legal Hold
- A legal hold is a process that preserves and protects all relevant data and evidence in anticipation of a legal investigation or litigation.
Detecting Rootkits
- To detect the presence of a rootkit, it's best to use a rootkit detection tool or a Host-Based Intrusion Detection System (HIDS) that can identify hidden files, processes, and registry entries.
Cybersecurity Due Diligence
- A security engineer should prioritize cybersecurity concerns and perform due diligence when implementing a new business application to ensure it meets security standards.
Alternative Backup Solutions
- A systems administrator considering switching from tape backup should implement a cloud backup or disk-based backup solution to allow for readily available data in the event of a disaster.
Authentication and SaaS Applications
- To reduce the number of credentials employees need to maintain, a data administrator can implement Single Sign-On (SSO) using domain credentials to access new SaaS applications.
Forensic Analysis
- A forensic specialist creates a plan to preserve data after an incident and prioritizes the sequence for performing forensic analysis to ensure that critical data is not compromised or lost.
Network Security Issues
- A security team may encounter a rogue DHCP server attack, where a compromised endpoint broadcasts its MAC as the default gateway's MAC, causing performance issues and unauthorized network access.
Batch Job Management
- To prevent disruptions caused by failed batch jobs, it's essential to have a knowledge transfer process in place, where critical job information and responsibilities are documented and shared among team members.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on tools that enable systems administrators to identify devices at remote facilities and push policies selectively. Choose the best option for determining devices at a distant location and applying policies to them.