Question 86

Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).
  • Question 87

    A security analyst is Investigating a malware incident at a company. The malware Is accessing a command-and-control website at www.comptia.com. All outbound Internet traffic is logged to a syslog server and stored in /logfiles/messages.
    Which of the following commands would be BEST for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?
  • Question 88

    Which of the following would satisfy three-factor authentication?
  • Question 89

    A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP. Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?
  • Question 90

    A Chief Executive Officer (CEO) is dissatisfied with the level of service from the company's new service provider. The service provider is preventing the CEO from sending email from a work account to a personal account. Which of the following types of service providers is being used?