Question 76

An organization implements split encryption keys for sensitive files. Which of the following types of risks does this mitigate?
  • Question 77

    An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?
  • Question 78

    Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?
  • Question 79

    A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?
  • Question 80

    A technician is attempting to log in to a Linux server as root but cannot remember the administrator password.
    Which of the following is the LEAST destructive method of resetting the administrator password?