Save
Terms in this set (305)
6.7% complete Complexity
This is a Multi Choice Question; skip Budgetary
ahead to question content
Correct
Correct AnswerYour Answer
A
B
C
✓
D
✓
Continue
Tags:
Domain 2.0
Exam Objective 2.5 (SY0-601)
Lesson 20
Topic 20C (SY0-601)
An organization configures both a
warm site and a hot site for disaster
preparedness. Doing so poses which
difficulties for the organization?
(Select all that apply.)
,An administrator uses data from a Correlation
Security Information and Event
Management (SIEM) system to
identify potential malicious activity.
Which feature does the administrator
utilize when implementing rules to
interpret relationships between
datapoints to diagnose incidents?
After a poorly handled security Corrective
breach, a company updates its
security policy to include an
improved incident response plan.
Which of the following security
controls does this update address?
Analyze and compare iOS and iOS is limited to Apple products, while Android has
Android operating systems (OS) to multiple hardware vendors.
accurately differentiate between the Android is an open source OS based on Linux,
two. (Select all that apply.) unlike iOS, which is a closed and proprietary
system.
Analyze and compare the access A DAC model is the most flexible and weakest
control models in terms of how access control model. The owner has full control
Access Control Lists (ACL) are over the resource and grants rights to others.
written and determine which
statement accurately explains the
Discretionary Access Control (DAC)
model
,Analyze and determine the role Data custodian
responsible for managing the system
where data assets are stored, and is
responsible for enforcing access
control, encryption, and backup
measures.
Analyze and eliminate the item that is Initial exploitation
NOT an example of a reconnaissance
technique.
Analyze and select the accurate VM escaping occurs as a result of malware jumping
statements about threats associated from one guest OS to another.
with virtualization. (Select all that A timing attack occurs by sending multiple
apply.) usernames to an authentication server to measure
the server response times.
Analyze automation strategies to A company is hired to provide data processing for
differentiate between elasticity and 10 additional clients and has a linear increase in
scalability. Which scenarios costs for the support.
demonstrate scalability? (Select all company has a 10% increase in clients and a 5%
that apply.) increase in costs.
Analyze each scenario and A user logs into a system using a control access
determine which best describes the card (CAC) and PIN number.
authentication process in an Identity
and Access Management (IAM)
system.
, Analyze each statement and SIEM can perform correlation, linking observables
determine which describes a into meaningful indicators of risk or compromise.
fundamental improvement on
traditional log management that
security information and event
management (SIEM) offers.
Analyze mobile device deployment The employee may use the mobile device to
models to select the best access personal email and social media accounts.
explanation of the Corporate The device is chosen and supplied by the
Owned, Personally-Enabled (COPE) company.
deployment model.
Analyze the available detection - Intrusion detection and NAC are security suites
techniques and determine which are and appliances that combine automated network
useful in identifying a rogue system scanning with defense and remediation suites to
through software management. prevent rogue devices from accessing the network.
(Select all that apply.) - Wireless monitoring can reveal whether there are
unauthorized access points.
Analyze the features of a Full Disk A drawback of FDE is the cryptographic operations
Encryption (FDE) to select the performed by the OS reduces performance.
statements that accurately reflect this FDE requires the secure storage of the key used to
type of security. (Select all that encrypt the drive contents.
apply.)
Analyze the features of behavioral - Behavioral technologies are cheap to implement,
technologies for authentication, and but have a higher error rate than other
choose the statements that technologies.
accurately depict this type of - Behavior technologies may use typing as a
biometric authentication. (Select all template, which matches the speed and pattern of
that apply.) a user's input of a passphrase.