269 - 329 Flashcards
A critical file server is being upgraded and the systems admin must determine which RAID level the new server will need to achieve parity and handle two simutaneaous disk Failures.
Which of the following RAID levels meet this requirements?
RAID 6
Due to unexpected circumstances, an IT company must vacate its main office, forcing all operations to alternate, off site locations. wWhich of the following will the company MOST likely reference for guidance during this change?
Retention Policy
An organization has implemented a two step verification processs to protect user access to data that 6 stored in the could. Each empoyee now uses an email address of mobile number a code to access the data.
Which of the following authentication methods did the organization implement?
Token Key
Which of the following would detect intrusions at the perimeter of an airport?
Fencing
Which of the following in a forensic investigation should be priorities based on the order of volatity? (Select Two)
Page files
Cache
A company has discovered unauthorized devices are using its WiFi network, and it wants to harden the access point to improve security.
Whcih of the following configuration should an analyst enable to improve security? (Select Two)
Radius
WPA2-PSK
An amusement park is implementing a biometric system that validates customers’ fingerprints to ensure they are not sharing tickets. The park’s owner values customers above all and would prefer customers’ convenience over security. For this reason, which of the following features should the security team prioritize FIRST?
Low Efficiency
Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following:
Multiple reports of breached credentials within that time period. Traffic being redirected in certain parts of teh network Fraudulent emails being sent by various internal users without their consent.
Which of the folloiwng types of attacks was MOST likely used?
Cross site scripting
A company wants to deply sytstems alongside production systems in order to entice threat actors and to learn more about attacks.
Which of the following BEST describe these systems?
DNS Sinkholes