Which of the following describes United States federal government cybersecurity policies and guidelines?
Correct Answer:A
A system administrator identifies unusual network traffic from outside the local network. Which of the following is the BEST method for mitigating the threat?
Correct Answer:C
A security investigator has detected an unauthorized insider reviewing files containing company secrets. Which of the following commands could the investigator use to determine which files have been opened by
this user?
Correct Answer:B
Malicious code designed to execute in concurrence with a particular event is BEST defined as which of the following?
Correct Answer:A
Which of the following data sources could provide indication of a system compromise involving the exfiltration of data to an unauthorized destination?
Correct Answer:A
According to company policy, all accounts with administrator privileges should have suffix _ja. While reviewing Windows workstation configurations, a security administrator discovers an account without the suffix in the administrator’s group. Which of the following actions should the security administrator take?
Correct Answer:B