ログイン

CNL_CH_10

CNL_CH_10
75問 • 2年前
  • Son Cagrı
  • 通報

    問題一覧

  • 1

    Which of the following would detect intrusions at the perimeter of an airport?

    Motion sensors

  • 2

    A building manager is concerned about people going in and out of the office during non-working hours. Which of the following physical security controls would provide the best solution?

    Locks

  • 3

    A local server recently crashed, and the team is attempting to restore the server from a backup. During the restore process, the team notices the file size of each daily backup is large and will run out of space at the current rate. The current solution appears to do a full backup every night. Which of the following would use the LEAST amount of storage space for backups?

    A weekly, full backup with daily incremental backup

  • 4

    Which of the following would BEST provide detective and corrective controls for thermal regulation?

    An HVAC system

  • 5

    An organization just implemented a new security system. Local laws state that citizens must be notified prior to encountering the detection mechanism to deter malicious activities. Which of the following is being implemented?

    Motion sensors with signage

  • 6

    Several attempts have been made to pick the door lock of a secure facility. As a result the security engineer has been assigned to implement a stronger preventative access control. Which of the following would BEST complete the engineer's assignment?

    Replacing the traditional key with an RFID key

  • 7

    Which of the following is the MOST likely reason for securing an air-gapped laboratory HVAC system?

    To avoid data leakage

  • 8

    A web server has been compromised due to a ransomware attack. Further investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?

    The last full backup that was conducted seven days ago

  • 9

    Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO)

    Mantraps, Fencing

  • 10

    Which of the following types of controls is a turnstile?

    Physical

  • 11

    Which of the following is a detective and deterrent control against physical intrusions?

    An alarm

  • 12

    Some laptops recently went missing from a locked storage area that is protected by keyless RFID-enabled locks. There is no obvious damage to the physical space. The security manager identifies who unlocked the door, however, human resources confirms the employee was on vacation at the time of the incident. Which of the following describes what MOST likely occurred?

    The employee's physical access card was cloned.

  • 13

    A system in the network is used to store proprietary secrets and needs the highest level of security possible. Which of the following should a security administrator implement to ensure the system cannot be reached from the Internet?

    Air gap

  • 14

    A university is opening a facility in a location where there is an elevated risk of theft. The university wants to protect the desktops in its classrooms and labs. Which of the following should the university use to BEST protect these assets deployed in the facility?

    Cable locks

  • 15

    Due to unexpected circumstances, an IT company must vacate its main office, forcing all operations to alternate, off-site locations. Which of the following will the company MOST likely reference for guidance during this change?

    The business continuity plan

  • 16

    Entering a secure area requires passing through two doors, both of which require someone who is already inside to initiate access. Which of the following types of physical security controls does this describe?

    Access control vestibule

  • 17

    During an asset inventory, several assets, supplies, and miscellaneous items were noted as missing. The security manager has been asked to find an automated solution to detect any future theft of equipment. Which of the following would be BEST to implement?

    Cameras

  • 18

    A company moved into a new building next to a sugar mill. Cracks have been discovered in the walls of the server room, which is located on the same side as the sugar mill loading docks. The cracks are believed to have been caused by heavy trucks. Moisture has begun to seep into the server room, causing extreme humidification problems and equipment failure. Which of the following BEST describes the type of threat the organization faces?

    Environmental

  • 19

    Restricting access to a military site. The controls need to be cost-effective and time-efficient methods. Which ones would be best? (Select two)

    Barricade, Signage

  • 20

    Which of the following should a technician use to protect a cellular phone that is needed for an investigation, to ensure the data will not be removed remotely?

    Faraday cage

  • 21

    Which of the following control sets should a well-written BCP include? (Select THREE)

    Preventive, Corrective, Recovery

  • 22

    A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?

    An air gap

  • 23

    An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO)

    Access control vestibules, Guards

  • 24

    Which of the following holds staff accountable while escorting unauthorized personnel?

    Badges

  • 25

    A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the organization’s executives determine the next course of action?

    A business continuity plan

  • 26

    A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?

    A malicious USB was introduced by an unsuspecting employee.

  • 27

    A user recently attended an exposition and received some digital promotional materials. The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open. Which of the following is MOST likely the cause of the reported issue?

    There was malicious code on the USB drive

  • 28

    A company is designing the layout of a new datacenter so it will have an optimal environmental temperature. Which of the following must be included? (Select TWO)

    A cold aisle, A hot aisle

  • 29

    Which of the following controls would be the MOST cost-effective and time-efficient to deter intrusions at the perimeter of a restricted, remote military training area? (Select TWO)

    Barricades, Signage

  • 30

    A company uses a drone for precise perimeter and boundary monitoring. Which of the following should be MOST concerning to the company?

    Privacy

  • 31

    An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:

    disaster recovery plan.

  • 32

    Which of the following is a physical security control that ensures only the authorized user is present when gaining access to a secured area?

    A biometric scanner

  • 33

    Which of the following controls would provide the BEST protection against tailgating?

    Access control vestibule

  • 34

    A company is concerned about individuals driving a car into the building to gain access. Which of the following security controls would work BEST to prevent this from happening?

    Bollard

  • 35

    Which Of the following security controls can be used to prevent multiple from using a unique card swipe and being admitted to an entrance?

    Access control vestibules

  • 36

    A desktop computer was recently stolen from a desk located in the lobby of an office building. Which of the following would be the best way to secure a replacement computer and deter future theft?

    Using cable locks on the hardware

  • 37

    Which of the following types of controls is a turnstile?

    Physical

  • 38

    Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO)

    Security guards, Video surveillance

  • 39

    A technician was dispatched to complete repairs on a server in a data center. While locating the server, the technician entered a restricted area without authorization. Which of the following security controls would BEST prevent this in the future?

    Implement access control vestibules.

  • 40

    An organization just implemented a new security system. Local laws state that citizens must be notified prior to encountering the detection mechanism to deter malicious activities. Which of the following is being implemented?

    Motion sensors with signage

  • 41

    Which of the following would BEST provide detective and corrective controls for thermal regulation?

    An HVAC system

  • 42

    Which of the following would detect intrusions at the perimeter of an airport?

    Motion sensors

  • 43

    An organization is building backup server rooms in geographically diverse locations. The Chief Information Security Officer implemented a requirement on the project that states the new hardware cannot be susceptible to the same vulnerabilities in the existing server room. Which of the following should the systems engineer consider?

    Purchasing hardware from different vendors

  • 44

    A junior systems administrator noticed that one of two hard drives in a server room had a red error notification. The administrator removed the hard drive to replace it but was unaware that the server was configured in an array. Which of the following configurations would ensure no data is lost?

    RAID 1

  • 45

    A security administrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?

    RAID 10

  • 46

    A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two-drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?

    6

  • 47

    A critical file server is being upgraded and the systems administrator must determine which RAID level the new server will need to achieve parity (5 veya 6) and handle two simultaneous disk failures. Which of the following RAID levels meets these requirements?

    RAID 6

  • 48

    An organization's RPO for a critical system is two hours. The system is used Monday through Friday, from 9:00 am to 5:00 pm. Currently, the organization performs a full backup every Saturday that takes four hours to complete. Which of the following additional backup implementations would be the BEST way for the analyst to meet the business requirements?

    Full backups Monday through Friday at 6:00 p.m and incremental backups hourly.

  • 49

    An organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sale systems. The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load. Which of the following are the BEST options to accomplish this objective'? (Select TWO)

    Load balancing, RAID

  • 50

    A company has been experiencing very brief power outages from its utility company over the last few months. These outages only last for one second each time. The utility company is aware of the issue and is working to replace a faulty transformer. Which of the following BEST describes what the company should purchase to ensure its critical servers and network devices stay online?

    AUPS

  • 51

    A large bank with two geographically dispersed data centers is concerned about major power disruptions at both locations. Every day each location experiences very brief outages that last for a few seconds. However during the summer a high risk of intentional brownouts that last up to an hour exists particularly at one of the locations near an industrial smelter. Which of the following is the BEST solution to reduce the risk of data loss?

    UPS

  • 52

    A web server administrator has redundant servers and needs to ensure failover to the secondary server when the primary server goes down. Which of the following should the administrator implement to avoid disruption?

    High availability

  • 53

    A company wants to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the BEST backup strategy to implement?

    Full backups followed by differential backups

  • 54

    A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two)

    Dual power supply, Off-site backups

  • 55

    A company has limited storage available and an online presence that cannot for more than four hours. Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time in the event of a failure, which being mindful of the limited available storage space?

    Implement full backups every Sunday at 8:00 p.m and nightly differential backups at 8:00

  • 56

    A systems administrator is considering different backup solutions for the IT infrastructure. The company is looking for a solution that offers the fastest recovery time while also saving the most amount of storage used to maintain the backups. Which of the following recovery solutions would be the BEST option to meet these requirements?

    Differential

  • 57

    A malware attack has corrupted 30TB of company data across all file servers. A systems administrator Identifies the malware and contains the issue, but the data is unrecoverable. The administrator is not concerned about the data loss because the company has a system in place that will allow users to access the data that was backed up last night. Which of the following resiliency techniques did the administrator MOST likely use to prevent impacts to business operations after an attack?

    RAID

  • 58

    A security team is providing input on the design of a secondary data center that has the following requirements: A natural disaster at the primary site should not affect the secondary site. The secondary site should have the capability for failover during traffic surge situations. The secondary site must meet the same physical security requirements as the primary site. The secondary site must provide protection against power surges and outages. Which of the following should the security team recommend? (Select two).

    Constructing the secondary site in a geographically disperse location, Installing generators

  • 59

    A Chief Information Security Officer has defined resiliency requirements for a new data center architecture The requirements are as follows ● Critical file shares will remain accessible during and after a natural disaster ● Five percent of hard disks can fail at any given time without impacting the data. ● Systems will be forced to shut down gracefully when battery levels are below 20% Which of the following are required to BEST meet these objectives? (Select THREE)

    RAID, UPS, Geographic dispersal

  • 60

    A company is moving to a new location. The systems administrator has provided the following server room requirements to the facilities staff: ● Consistent power levels in case of brownouts or voltage spikes ● A minimum of 30 minutes runtime following a power outage ● Ability to trigger graceful shutdowns of critical systems Which of the following would BEST meet the requirements?

    Deploying an appropriately sized, network-connected UPS device

  • 61

    A security team suspects that the cause of recent power consumption overloads is the unauthorized use of empty power outlets in the network rack. Which of the following options will mitigate this issue without compromising the number of outlets available?

    Installing a managed PDU

  • 62

    Which of the following disaster recovery tests is the LEAST time-consuming for the disaster recovery team?

    Tabletop

  • 63

    An organization's corporate offices were destroyed due to a natural disaster, so the organization is now setting up offices in a temporary work space. Which of the following will the organization MOST likely consult?

    The business continuity plan

  • 64

    A Chief Information Security Officer (CISO) is concerned about the organization's ability to continue business operation in the event of a prolonged DDoS attack on its local datacenter that consumes database resources. Which of the following will the CISO MOST likely recommend to mitigate this risk?

    Implement a hot-site failover location

  • 65

    An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?

    Disaster recovery

  • 66

    An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:

    Disaster recovery plan

  • 67

    Which of the following is the difference between a DRP and a BCP?

    A BCP keeps operations running during a disaster while a DRP does not.

  • 68

    Which of the following would produce the closest experience of responding to an actual incident response scenario?

    Simulation

  • 69

    Which of the following must be in place before implementing a BCP?

    BIA

  • 70

    Which of the following best ensures minimal downtime for organizations critical computing equipment located in earthquake-prone areas?

    Off-site replication

  • 71

    A company has installed badge readers for building access but is finding unauthorized individuals roaming the hallways. Which of the following is the most likely cause?

    Tailgating

  • 72

    A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?

    A. Capacity planning

  • 73

    An organization is building a new headquarters and has placed fake cameras around the building in an attempt to discourage potential intruders. Which of the following kinds of controls describes this security method?

    Deterrent

  • 74

    Which of the following security controls is used to isolate a section of the network and its externally available resources from the internal corporate network in order to reduce the number of possible attacks?

    Air gap

  • 75

    An organization suffered numerous multiday power outages at its current location. The Chief Executive Officer wants to create a disaster recovery strategy to resolve this issue. Which of the following options offer low-cost solutions? (Select two).

    Generator, UPS

  • CNL_CH_1

    CNL_CH_1

    Son Cagrı · 3回閲覧 · 185問 · 2年前

    CNL_CH_1

    CNL_CH_1

    3回閲覧 • 185問 • 2年前
    Son Cagrı

    CNL_CH_2

    CNL_CH_2

    Son Cagrı · 109問 · 2年前

    CNL_CH_2

    CNL_CH_2

    109問 • 2年前
    Son Cagrı

    CNL_CH_3

    CNL_CH_3

    Son Cagrı · 90問 · 2年前

    CNL_CH_3

    CNL_CH_3

    90問 • 2年前
    Son Cagrı

    CNL_CH_4

    CNL_CH_4

    Son Cagrı · 48問 · 2年前

    CNL_CH_4

    CNL_CH_4

    48問 • 2年前
    Son Cagrı

    CNL_CH_5

    CNL_CH_5

    Son Cagrı · 83問 · 2年前

    CNL_CH_5

    CNL_CH_5

    83問 • 2年前
    Son Cagrı

    CNL_CH_6

    CNL_CH_6

    Son Cagrı · 100問 · 2年前

    CNL_CH_6

    CNL_CH_6

    100問 • 2年前
    Son Cagrı

    CNL_CH_7

    CNL_CH_7

    Son Cagrı · 43問 · 2年前

    CNL_CH_7

    CNL_CH_7

    43問 • 2年前
    Son Cagrı

    CNL_CH_8

    CNL_CH_8

    Son Cagrı · 66問 · 2年前

    CNL_CH_8

    CNL_CH_8

    66問 • 2年前
    Son Cagrı

    CNL_CH_9

    CNL_CH_9

    Son Cagrı · 49問 · 2年前

    CNL_CH_9

    CNL_CH_9

    49問 • 2年前
    Son Cagrı

    CNL_CH_11

    CNL_CH_11

    Son Cagrı · 118問 · 2年前

    CNL_CH_11

    CNL_CH_11

    118問 • 2年前
    Son Cagrı

    CNL_CH_12

    CNL_CH_12

    Son Cagrı · 124問 · 2年前

    CNL_CH_12

    CNL_CH_12

    124問 • 2年前
    Son Cagrı

    CNL_CH_13

    CNL_CH_13

    Son Cagrı · 95問 · 2年前

    CNL_CH_13

    CNL_CH_13

    95問 • 2年前
    Son Cagrı

    21 Mayis

    21 Mayis

    Son Cagrı · 69問 · 1年前

    21 Mayis

    21 Mayis

    69問 • 1年前
    Son Cagrı

    20 Mayis -175-

    20 Mayis -175-

    Son Cagrı · 174問 · 1年前

    20 Mayis -175-

    20 Mayis -175-

    174問 • 1年前
    Son Cagrı

    30 Mayis

    30 Mayis

    Son Cagrı · 209問 · 1年前

    30 Mayis

    30 Mayis

    209問 • 1年前
    Son Cagrı

    A-1

    A-1

    Son Cagrı · 216問 · 1年前

    A-1

    A-1

    216問 • 1年前
    Son Cagrı

    A-2

    A-2

    Son Cagrı · 184問 · 1年前

    A-2

    A-2

    184問 • 1年前
    Son Cagrı

    A-3

    A-3

    Son Cagrı · 68問 · 1年前

    A-3

    A-3

    68問 • 1年前
    Son Cagrı

    exam topics

    exam topics

    Son Cagrı · 306問 · 1年前

    exam topics

    exam topics

    306問 • 1年前
    Son Cagrı

    pass4future

    pass4future

    Son Cagrı · 330問 · 1年前

    pass4future

    pass4future

    330問 • 1年前
    Son Cagrı

    son 1

    son 1

    Son Cagrı · 349問 · 1年前

    son 1

    son 1

    349問 • 1年前
    Son Cagrı

    son 2

    son 2

    Son Cagrı · 113問 · 1年前

    son 2

    son 2

    113問 • 1年前
    Son Cagrı

    son 3

    son 3

    Son Cagrı · 63問 · 1年前

    son 3

    son 3

    63問 • 1年前
    Son Cagrı

    問題一覧

  • 1

    Which of the following would detect intrusions at the perimeter of an airport?

    Motion sensors

  • 2

    A building manager is concerned about people going in and out of the office during non-working hours. Which of the following physical security controls would provide the best solution?

    Locks

  • 3

    A local server recently crashed, and the team is attempting to restore the server from a backup. During the restore process, the team notices the file size of each daily backup is large and will run out of space at the current rate. The current solution appears to do a full backup every night. Which of the following would use the LEAST amount of storage space for backups?

    A weekly, full backup with daily incremental backup

  • 4

    Which of the following would BEST provide detective and corrective controls for thermal regulation?

    An HVAC system

  • 5

    An organization just implemented a new security system. Local laws state that citizens must be notified prior to encountering the detection mechanism to deter malicious activities. Which of the following is being implemented?

    Motion sensors with signage

  • 6

    Several attempts have been made to pick the door lock of a secure facility. As a result the security engineer has been assigned to implement a stronger preventative access control. Which of the following would BEST complete the engineer's assignment?

    Replacing the traditional key with an RFID key

  • 7

    Which of the following is the MOST likely reason for securing an air-gapped laboratory HVAC system?

    To avoid data leakage

  • 8

    A web server has been compromised due to a ransomware attack. Further investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?

    The last full backup that was conducted seven days ago

  • 9

    Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO)

    Mantraps, Fencing

  • 10

    Which of the following types of controls is a turnstile?

    Physical

  • 11

    Which of the following is a detective and deterrent control against physical intrusions?

    An alarm

  • 12

    Some laptops recently went missing from a locked storage area that is protected by keyless RFID-enabled locks. There is no obvious damage to the physical space. The security manager identifies who unlocked the door, however, human resources confirms the employee was on vacation at the time of the incident. Which of the following describes what MOST likely occurred?

    The employee's physical access card was cloned.

  • 13

    A system in the network is used to store proprietary secrets and needs the highest level of security possible. Which of the following should a security administrator implement to ensure the system cannot be reached from the Internet?

    Air gap

  • 14

    A university is opening a facility in a location where there is an elevated risk of theft. The university wants to protect the desktops in its classrooms and labs. Which of the following should the university use to BEST protect these assets deployed in the facility?

    Cable locks

  • 15

    Due to unexpected circumstances, an IT company must vacate its main office, forcing all operations to alternate, off-site locations. Which of the following will the company MOST likely reference for guidance during this change?

    The business continuity plan

  • 16

    Entering a secure area requires passing through two doors, both of which require someone who is already inside to initiate access. Which of the following types of physical security controls does this describe?

    Access control vestibule

  • 17

    During an asset inventory, several assets, supplies, and miscellaneous items were noted as missing. The security manager has been asked to find an automated solution to detect any future theft of equipment. Which of the following would be BEST to implement?

    Cameras

  • 18

    A company moved into a new building next to a sugar mill. Cracks have been discovered in the walls of the server room, which is located on the same side as the sugar mill loading docks. The cracks are believed to have been caused by heavy trucks. Moisture has begun to seep into the server room, causing extreme humidification problems and equipment failure. Which of the following BEST describes the type of threat the organization faces?

    Environmental

  • 19

    Restricting access to a military site. The controls need to be cost-effective and time-efficient methods. Which ones would be best? (Select two)

    Barricade, Signage

  • 20

    Which of the following should a technician use to protect a cellular phone that is needed for an investigation, to ensure the data will not be removed remotely?

    Faraday cage

  • 21

    Which of the following control sets should a well-written BCP include? (Select THREE)

    Preventive, Corrective, Recovery

  • 22

    A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?

    An air gap

  • 23

    An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO)

    Access control vestibules, Guards

  • 24

    Which of the following holds staff accountable while escorting unauthorized personnel?

    Badges

  • 25

    A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the organization’s executives determine the next course of action?

    A business continuity plan

  • 26

    A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?

    A malicious USB was introduced by an unsuspecting employee.

  • 27

    A user recently attended an exposition and received some digital promotional materials. The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open. Which of the following is MOST likely the cause of the reported issue?

    There was malicious code on the USB drive

  • 28

    A company is designing the layout of a new datacenter so it will have an optimal environmental temperature. Which of the following must be included? (Select TWO)

    A cold aisle, A hot aisle

  • 29

    Which of the following controls would be the MOST cost-effective and time-efficient to deter intrusions at the perimeter of a restricted, remote military training area? (Select TWO)

    Barricades, Signage

  • 30

    A company uses a drone for precise perimeter and boundary monitoring. Which of the following should be MOST concerning to the company?

    Privacy

  • 31

    An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:

    disaster recovery plan.

  • 32

    Which of the following is a physical security control that ensures only the authorized user is present when gaining access to a secured area?

    A biometric scanner

  • 33

    Which of the following controls would provide the BEST protection against tailgating?

    Access control vestibule

  • 34

    A company is concerned about individuals driving a car into the building to gain access. Which of the following security controls would work BEST to prevent this from happening?

    Bollard

  • 35

    Which Of the following security controls can be used to prevent multiple from using a unique card swipe and being admitted to an entrance?

    Access control vestibules

  • 36

    A desktop computer was recently stolen from a desk located in the lobby of an office building. Which of the following would be the best way to secure a replacement computer and deter future theft?

    Using cable locks on the hardware

  • 37

    Which of the following types of controls is a turnstile?

    Physical

  • 38

    Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO)

    Security guards, Video surveillance

  • 39

    A technician was dispatched to complete repairs on a server in a data center. While locating the server, the technician entered a restricted area without authorization. Which of the following security controls would BEST prevent this in the future?

    Implement access control vestibules.

  • 40

    An organization just implemented a new security system. Local laws state that citizens must be notified prior to encountering the detection mechanism to deter malicious activities. Which of the following is being implemented?

    Motion sensors with signage

  • 41

    Which of the following would BEST provide detective and corrective controls for thermal regulation?

    An HVAC system

  • 42

    Which of the following would detect intrusions at the perimeter of an airport?

    Motion sensors

  • 43

    An organization is building backup server rooms in geographically diverse locations. The Chief Information Security Officer implemented a requirement on the project that states the new hardware cannot be susceptible to the same vulnerabilities in the existing server room. Which of the following should the systems engineer consider?

    Purchasing hardware from different vendors

  • 44

    A junior systems administrator noticed that one of two hard drives in a server room had a red error notification. The administrator removed the hard drive to replace it but was unaware that the server was configured in an array. Which of the following configurations would ensure no data is lost?

    RAID 1

  • 45

    A security administrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?

    RAID 10

  • 46

    A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two-drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?

    6

  • 47

    A critical file server is being upgraded and the systems administrator must determine which RAID level the new server will need to achieve parity (5 veya 6) and handle two simultaneous disk failures. Which of the following RAID levels meets these requirements?

    RAID 6

  • 48

    An organization's RPO for a critical system is two hours. The system is used Monday through Friday, from 9:00 am to 5:00 pm. Currently, the organization performs a full backup every Saturday that takes four hours to complete. Which of the following additional backup implementations would be the BEST way for the analyst to meet the business requirements?

    Full backups Monday through Friday at 6:00 p.m and incremental backups hourly.

  • 49

    An organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sale systems. The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load. Which of the following are the BEST options to accomplish this objective'? (Select TWO)

    Load balancing, RAID

  • 50

    A company has been experiencing very brief power outages from its utility company over the last few months. These outages only last for one second each time. The utility company is aware of the issue and is working to replace a faulty transformer. Which of the following BEST describes what the company should purchase to ensure its critical servers and network devices stay online?

    AUPS

  • 51

    A large bank with two geographically dispersed data centers is concerned about major power disruptions at both locations. Every day each location experiences very brief outages that last for a few seconds. However during the summer a high risk of intentional brownouts that last up to an hour exists particularly at one of the locations near an industrial smelter. Which of the following is the BEST solution to reduce the risk of data loss?

    UPS

  • 52

    A web server administrator has redundant servers and needs to ensure failover to the secondary server when the primary server goes down. Which of the following should the administrator implement to avoid disruption?

    High availability

  • 53

    A company wants to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the BEST backup strategy to implement?

    Full backups followed by differential backups

  • 54

    A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two)

    Dual power supply, Off-site backups

  • 55

    A company has limited storage available and an online presence that cannot for more than four hours. Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time in the event of a failure, which being mindful of the limited available storage space?

    Implement full backups every Sunday at 8:00 p.m and nightly differential backups at 8:00

  • 56

    A systems administrator is considering different backup solutions for the IT infrastructure. The company is looking for a solution that offers the fastest recovery time while also saving the most amount of storage used to maintain the backups. Which of the following recovery solutions would be the BEST option to meet these requirements?

    Differential

  • 57

    A malware attack has corrupted 30TB of company data across all file servers. A systems administrator Identifies the malware and contains the issue, but the data is unrecoverable. The administrator is not concerned about the data loss because the company has a system in place that will allow users to access the data that was backed up last night. Which of the following resiliency techniques did the administrator MOST likely use to prevent impacts to business operations after an attack?

    RAID

  • 58

    A security team is providing input on the design of a secondary data center that has the following requirements: A natural disaster at the primary site should not affect the secondary site. The secondary site should have the capability for failover during traffic surge situations. The secondary site must meet the same physical security requirements as the primary site. The secondary site must provide protection against power surges and outages. Which of the following should the security team recommend? (Select two).

    Constructing the secondary site in a geographically disperse location, Installing generators

  • 59

    A Chief Information Security Officer has defined resiliency requirements for a new data center architecture The requirements are as follows ● Critical file shares will remain accessible during and after a natural disaster ● Five percent of hard disks can fail at any given time without impacting the data. ● Systems will be forced to shut down gracefully when battery levels are below 20% Which of the following are required to BEST meet these objectives? (Select THREE)

    RAID, UPS, Geographic dispersal

  • 60

    A company is moving to a new location. The systems administrator has provided the following server room requirements to the facilities staff: ● Consistent power levels in case of brownouts or voltage spikes ● A minimum of 30 minutes runtime following a power outage ● Ability to trigger graceful shutdowns of critical systems Which of the following would BEST meet the requirements?

    Deploying an appropriately sized, network-connected UPS device

  • 61

    A security team suspects that the cause of recent power consumption overloads is the unauthorized use of empty power outlets in the network rack. Which of the following options will mitigate this issue without compromising the number of outlets available?

    Installing a managed PDU

  • 62

    Which of the following disaster recovery tests is the LEAST time-consuming for the disaster recovery team?

    Tabletop

  • 63

    An organization's corporate offices were destroyed due to a natural disaster, so the organization is now setting up offices in a temporary work space. Which of the following will the organization MOST likely consult?

    The business continuity plan

  • 64

    A Chief Information Security Officer (CISO) is concerned about the organization's ability to continue business operation in the event of a prolonged DDoS attack on its local datacenter that consumes database resources. Which of the following will the CISO MOST likely recommend to mitigate this risk?

    Implement a hot-site failover location

  • 65

    An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?

    Disaster recovery

  • 66

    An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:

    Disaster recovery plan

  • 67

    Which of the following is the difference between a DRP and a BCP?

    A BCP keeps operations running during a disaster while a DRP does not.

  • 68

    Which of the following would produce the closest experience of responding to an actual incident response scenario?

    Simulation

  • 69

    Which of the following must be in place before implementing a BCP?

    BIA

  • 70

    Which of the following best ensures minimal downtime for organizations critical computing equipment located in earthquake-prone areas?

    Off-site replication

  • 71

    A company has installed badge readers for building access but is finding unauthorized individuals roaming the hallways. Which of the following is the most likely cause?

    Tailgating

  • 72

    A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?

    A. Capacity planning

  • 73

    An organization is building a new headquarters and has placed fake cameras around the building in an attempt to discourage potential intruders. Which of the following kinds of controls describes this security method?

    Deterrent

  • 74

    Which of the following security controls is used to isolate a section of the network and its externally available resources from the internal corporate network in order to reduce the number of possible attacks?

    Air gap

  • 75

    An organization suffered numerous multiday power outages at its current location. The Chief Executive Officer wants to create a disaster recovery strategy to resolve this issue. Which of the following options offer low-cost solutions? (Select two).

    Generator, UPS