Question 97

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?

Correct Answer:A

Question 98

Which of the following describes the ability of code to target a hypervisor from inside

Correct Answer:B

Question 99

A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?

Correct Answer:D

Question 100

A privileged user at a company stole several proprietary documents from a server. The user also went into the log files and deleted all records of the incident. The systems administrator has Just informed investigators that other log files are available for review. Which of the following did the administrator MOST likely configure that will assist the investigators?

Correct Answer:B

Question 101

An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?

Correct Answer:A

Question 102

A client sent several inquiries to a project manager about the delinquent delivery status of some critical reports. The project manager darned the reports were previously sent via email but then quickly generated and backdated the reports before submitting them via a new email message Which of the following actions MOST likely supports an investigation for fraudulent submission?

Correct Answer:D

START SY0-601 EXAM