Question 26

Security analyst must enforce policies to harden an MOM infrastructure. The requirements are as follows
* Ensure mobile devices can be traded and wiped.
* Confirm mobile devices are encrypted.
Which of the following should the analyst enable on all the devices to meet these requirements?
  • Question 27

    A security analyst needs to produce a document that details how a security incident occurred, the steps that were taken for recovery, and how future incidents can be avoided. During which of the following stages of the response process will this activity take place?
  • Question 28

    A forensics investigator is examining a number of unauthorized payments that were reported on the 00mpany's website. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users reported the email to the phishing team, and the forwarded email revealed the link to be:

    Which of the following will the forensics investigator MOST likely determine has occurred?
  • Question 29

    An organization is concerned about intellectual property theft by employee who leave the organization. Which of the following will be organization MOST likely implement?
  • Question 30

    A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.
    INSTRUCTIONS
    Click on each firewall to do the following:
    Deny cleartext web traffic.
    Ensure secure management protocols are used.Resolve issues at the DR site.
    The ruleset order cannot be modified due to outside constraints.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.