A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two- drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?
Correct Answer:B
Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations?
Correct Answer:C
An organization's Chief Security Officer (CSO) wants to validate the business's involvement in the incident response plan to ensure its validity and thoroughness. Which of the following will the CSO MOST likely use?
Correct Answer:C
A bank detects fraudulent activity on user's account. The user confirms transactions completed yesterday on the bank's website at https://www.company.com. A security analyst then examines the user's
Internet usage logs and observes the following output: date; username; url;destinationport; responsecode
2020-03-01; userann; http: //www.company.org/;80;302; userann: http://www.company.org/secure_login/;80;200 2020-03-01; userann:
http://www.company.org/dashboard/;80;200
Which of the following has MOST likely occurred?
Correct Answer:A
After a ransomware attack a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?
Correct Answer:A
A security researcher is attempting to gather data on the widespread use of a Zero-day exploit. Which of the following will the researcher MOST likely use to capture this data?
Correct Answer:B