Question 1 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider? A. Geographic dispersion B. Platform diversity C. Hot site D. Load balancing Submit Answer
Question 2 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following should be used to ensure that a device is inaccessible to a network-connected resource? A. Disablement of unused services B. Web application firewall C. Host isolation D. Network-based IDS Submit Answer
Question 3 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A company receives an alert that a network device vendor, which is widely used in the enterprise, has been banned by the government. Which of the following will the company’s general counsel most likely be concerned with during a hardware refresh of these devices? A. Sanctions B. Data sovereignty C. Cost of replacement D. Loss of license Submit Answer
Question 4 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use? A. Deploying PowerShell scripts B. Pushing GPO update C. Enabling PAP D. Updating EDR profiles Submit Answer
Question 5 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following attacks primarily targets insecure networks? A. Evil twin B. Impersonation C. Watering hole D. Pretexting Submit Answer