- (Exam Topic 4)
A security analyst is reviewing the following command-line output:
Which of the following Is the analyst observing?
Correct Answer:
C
- (Exam Topic 3)
A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company. information on user devices. Which of the following solutions would BEST support the policy?
Correct Answer:
A
- (Exam Topic 2)
The Chief Information Security Officer (CISO) of a bank recently updated the incident response policy. The CISO is concerned that members of the incident response team do not understand their roles. The bank wants to test the policy but with the least amount of resources or impact. Which of the following BEST meets the requirements?
Correct Answer:
B
- (Exam Topic 3)
Which of the following BEST helps to demonstrate integrity during a forensic investigation?
Correct Answer:
C
- (Exam Topic 3)
A security engineer needs to Implement the following requirements:
• All Layer 2 switches should leverage Active Directory tor authentication.
• All Layer 2 switches should use local fallback authentication If Active Directory Is offline.
• All Layer 2 switches are not the same and are manufactured by several vendors.
Which of the following actions should the engineer take to meet these requirements? (Select TWO). Implement RADIUS.
Correct Answer:
AB