Question 6

Which of the following describes the ability of code to target a hypervisor from inside
  • Question 7

    To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization?
  • Question 8

    The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?
  • Question 9

    A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?
  • Question 10

    An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?