Internet Information Services (IIS) logs can be used for which of the following purposes? (Select all correct answers.)
An organization is recovering data following a datacenter outage and determines that backup copies of files containing personal information were stored in an unsecure location, because the sensitivity was unknown. Which of the following activities should occur to prevent this in the future?
Which of the following would be considered a best security practice when deciding where to store log files?
A forensic image of a hard drive has been created. Which of the following can be used to demonstrate the image has not been tampered with?
Virtualization technology is implemented as operating systems and applications that run in software. It is implemented as a virtual machine. Of the following, which can be a security benefit when using virtualization technology?
When preparing to securely dispose of a hard drive, what is the term for reducing the magnetic flux density of the media to zero?
You are conducting a quantitative risk assessment for an organization to identify the risk of a fire in a data center. The data center is valued at $10 million and you expect a fire to occur once every 50 years that will damage three-quarters of the data center (including equipment). What is your exposure factor?
Which of the following needs to be backed up on a domain controller to recover Active Directory?
Upper management decides which risk to mitigate based on cost. This is an example of?(D)
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?
Question 1 of 10