What does full-disk encryption protect against check all that apply. quizlet
Hint: The PDF is way easier to read, just sign up / register to get it free. Code: Show
Found these changes to the certmaster....thanks for this upload this was super helpful: A support technician reviews a computer's boot integrity capabilities and discovers that the system supports a measured boot process. Which statement accurately describes this process? Measured boot is configured with digital certificates from valid OS vendors.(No) Measured boot will record the presence of unsigned kernel-level code. (YES) Measured boot transmits a boot log report signed by the TPM in the system.(No) Measured boot encrypts the entire contents of the system drive (or volume). (no) Engineers are considering network options that will maintain data transfers between systems within the same cloud-based data-center. They also look to configure security on these systems. Which of the following would ensure this type of implementation? (Select all that apply.) Set up efficient east-west traffic. (Yes) Set up zero trust. (Yes) Set up perimeter DMZ. (No) Set up BPDU guard. (No) Select the vulnerabilities that can influence routing. (Select all that apply.) Source routing (Yes) Traffic blocking (no) Route injection (yes) Software exploits (Yes)
And thank you for contributing. I am all about making life make more sense and awesome people like you clearly are <3 much love your way
Thank you for sharing this information with us - we rely on other takers of this to keep this thread up to date with latest information. This will help everyone! You are welcome, that is all I was trying to do by making this. I wanted to make it easier for people to 'study' to get a 100% on the tests because that is a totally ridiculous number to expect of anyone. Sir, I am going to have to ask you to navigate here https://www.sumatrapdfreader.org/download-free-pdf-viewer.html and select your appropriate architecture (32/64), install Sumatra PDF and open the PDF. Should be simple enough. If you need direct assistance, I will connect with you via TeamViewer. Just let me know!
I would like to thank you for posting this. Deeply appreciative as I used this in a pinch to renew. Again, thank you.
Found this question.
An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable?
What are the differences between WPA and WPA2? (Select all that apply.)
Heads up: the answer to this question has been recently changed by CompTIA:
CompTIA has changed the answer to this question: An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt? A. Data masking (wrong) B. Code obfuscation (wrong) C. Tokenization (correct) D. Hashing (wrong) Identify the command that will output the first 15 lines in a log file called hostnames where the system writes in chronological order starting from the top of the file. tail -n 15 /var/log/hostnames (wrong) cat -n hostnames (wrong) head -n 15 /var/log/hostnames (correct) logger -n 10.1.0.242 `hostnames` 15 (wrong) Identify the command that will output the last 15 lines in the log file called hostnames. tail -n 15 /var/log/hostnames (correct) head -n 15 /var/log/hostnames (wrong) logger -n 10.1.0.242 `hostnames` 15 (wrong) cat -n hostnames (wrong) A lot of changes have been made to the test.. A cloud customer prefers separating storage resources that hold different sets of data in virtual private clouds (VPCs). One of those data sets must comply with Health Insurance Portability and Accountability Act (HIPAA) guidelines for patient data. How should the customer configure these VPCs to ensure the highest degree of network security? A. Use separate VPCs for each network segment. (correct) B. Create multiple security groups. (wrong) C. Monitor the virtual instance usage. (wrong) D. Use third-party next generation firewall. (wrong) Employees have the ability to download certain applications onto their workstations to complete work functions. The CIO enacted a policy to ensure that no modifications to the application have occurred. What method of validation did the CIO implement? A. Input validation (wrong) B. Code signing (correct) C. Race conditions (wrong) D. Code obfuscation (wrong) 82.5% complete Question A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust and communicate securely with public websites. Which type of certificate is the network administrator currently importing? A. Root (correct) B. SAN (wrong) C. Computer (wrong) D. Wildcard (wrong) A public key infrastructure (PKI) is being set up for a logistics company, utilizing OpenSSL hosted on Red Hat Enterprise Linux. Which of the following commands can the team use, when setting up the PKI, to create an encrypted RSA private key? A. openssl genrsa -aes256 -out server.key 1024 (correct) B. openssl rsa -in server.key -pubout (wrong) C. openssl rsa -check -in server.key (wrong) D. openssl x509 -x509toreq -in cert.pem -out server.csr -signkey server.key (wrong) An administrator deploys a basic network intrusion detection system (NIDS) device to identify known attacks. What detection method does this device use? A. Signature-based (correct) B. Anomaly-based (wrong) C. Heuristic-based (wrong) D. Behavioral-based (wrong) A cloud administrator deploys two cloud servers on the Amazon Web Services (AWS) platform, each in a separately defined virtual network. How does the administrator get both servers to communicate with each other without using an Internet gateway? A. Set up a public subnet. (wrong) B. Configure VPC endpoint interface. (correct) C. Use third-party solutions. (wrong) D. Configure monitoring and track usage. (wrong) Consider the principles of web server hardening and determine which actions a system administrator should take when deploying a new web server in a demilitarized zone (DMZ). (Select all that apply.) A. Establish a guest zone (correct) B. Upload files using SSH (correct) C. Use configuration templates (correct) D. Place the server within the corporate network (wrong)
New format for listed questions:
HI! Just passed 1.0 and 2.0 today. The below questions answers as noted here are incorrect. I have updated the answers to the questions below. Enjoy! An attacker used an illegal access point (AP) with a very strong signal near a wireless network. If the attacker performed a jamming attack, which of the following would mitigate this type of network disruption? (Select all that apply.) A. Boost the signal of the legitimate equipment. (correct) B. Locate the offending radio source and disable it. (correct) C. Use a spectrum analyzer. (wrong) D. Install a Personal Area Network (PAN). (wrong)
What does fullFull disk encryption protects the data on your device in the event it is lost or stolen. Without full disk encryption, if the data drive in the computer is removed, the data can be easily read and accessed.
What's the purpose of escrowing a disk encryption key quizlet?What's the purpose of escrowing a disk encryption key? Performing data recovery. While full-disk encryption provides data integrity, the key escrow process is just a backup or recovery mechanism. This way, the encrypted data can still be accessed if the password is lost or forgotten.
Which of these plays an important role in keeping attack traffic off your systems and helps to protect user?A firewall is essential software or firmware in network security that is used to prevent unauthorized access to a network.
What is the relationship between attack vectors and attack surface quizlet?How are attack vectors and attack surfaces related? An attack surface is the sum of all attack vectors.
|