Question 76
An organization implements split encryption keys for sensitive files. Which of the following types of risks does this mitigate?
Question 77
An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?
Question 78
Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?
Question 79
A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?
Question 80
A technician is attempting to log in to a Linux server as root but cannot remember the administrator password.
Which of the following is the LEAST destructive method of resetting the administrator password?
Which of the following is the LEAST destructive method of resetting the administrator password?

