Question 56

Which of the following distributes data among nodes, making it more difficult to manipulate the data while also minimizing downtime?
  • Question 57

    A Chief Information Security Officer (CISO) needs to create a policy set that meets international standards for data privacy and sharing. Which of the following should the CISO read and understand before writing the policies?
  • Question 58

    An end user reports a computer has been acting slower than normal for a few weeks. During an investigation, an analyst determines the system is sending the user's email address and a ten-digit number to an IP address once a day. The only recent log entry regarding the user's computer is the following:

    Which of the following is the MOST likely cause of the issue?
  • Question 59

    A company's bank has reported that multiple corporate credit cards have been stolen over the past several weeks. The bank has provided the names of the affected cardholders to the company's forensics team to assist in the cyber-incident investigation.
    An incident responder learns the following information:
    The timeline of stolen card numbers corresponds closely with affected users making Internet-based purchases from diverse websites via enterprise desktop PCs.
    All purchase connections were encrypted, and the company uses an SSL inspection proxy for the inspection of encrypted traffic of the hardwired network.
    Purchases made with corporate cards over the corporate guest Wifi network, where no SSL inspection occurs, were unaffected.
    Which of the following is the MOST likely root cause?
  • Question 60

    An organization's corporate offices were destroyed due to a natural disaster, so the organization is now setting up offices in a temporary work space. Which of the following will the organization MOST likely consult?