269 - 329 Flashcards

1
Q

A critical file server is being upgraded and the systems admin must determine which RAID level the new server will need to achieve parity and handle two simutaneaous disk Failures.

Which of the following RAID levels meet this requirements?

A

RAID 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Due to unexpected circumstances, an IT company must vacate its main office, forcing all operations to alternate, off site locations. wWhich of the following will the company MOST likely reference for guidance during this change?

A

Retention Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization has implemented a two step verification processs to protect user access to data that 6 stored in the could. Each empoyee now uses an email address of mobile number a code to access the data.

Which of the following authentication methods did the organization implement?

A

Token Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would detect intrusions at the perimeter of an airport?

A

Fencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following in a forensic investigation should be priorities based on the order of volatity? (Select Two)

A

Page files

Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company has discovered unauthorized devices are using its WiFi network, and it wants to harden the access point to improve security.

Whcih of the following configuration should an analyst enable to improve security? (Select Two)

A

Radius

WPA2-PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An amusement park is implementing a biometric system that validates customers’ fingerprints to ensure they are not sharing tickets. The park’s owner values customers above all and would prefer customers’ convenience over security. For this reason, which of the following features should the security team prioritize FIRST?

A

Low Efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following:

Multiple reports of breached credentials within that time period. Traffic being redirected in certain parts of teh network Fraudulent emails being sent by various internal users without their consent.

Which of the folloiwng types of attacks was MOST likely used?

A

Cross site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company wants to deply sytstems alongside production systems in order to entice threat actors and to learn more about attacks.

Which of the following BEST describe these systems?

A

DNS Sinkholes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly