A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?
B
An IT manager is increasing the security capabilities of an organization after a data classification initiative determined that sensitive data could be exfiltrated from the environment. Which of the following solutions would mitigate the risk?
C
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
B
A security analyst is reviewing the logs on an organizations DNS server and notices the following unusual snippet:
Which of the following attack techniques was most likely used?
C
Which of the following describes the maximum allowance of accepted risk?
D
Which of the following threat actors is the most likely to be motivated by profit?
C
Which of the following exercises should an organization use to improve its incident response process?
A
A systems administrator would like to deploy a change to a production system. Which of the following must the administrator submit to demonstrate that the system can be restored to a working state in the event of a performance issue?
A
A security engineer is installing an IPS to block signature-based attacks in the environment.
Which of the following modes will best accomplish this task?
D
A city municipality lost its primary data center when a tornado hit the facility. Which of the following should the city staff use immediately after the disaster to handle essential public services?
C