Question 66

A system administrator needs to implement an access control scheme that will allow an object's access policy be determined by its owner.
Which of the following access control schemes BEST fits the requirements?
  • Question 67

    Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
    INSTRUCTIONS
    Not all attacks and remediation actions will be used.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    Question 68

    Hackers recently attacked a company's network and obtained several unfavorable pictures from the Chief Executive Officer's workstation. The hackers are threatening to send the images to the press if a ransom is not paid. Which of the following is impacted the MOST?
  • Question 69

    After a hardware incident, an unplanned emergency maintenance activity was conducted to rectify the issue. Multiple alerts were generated on the SIEM during this period of time. Which of the following BEST explains what happened?
  • Question 70

    Which of the following will MOST likely cause machine learning and Al-enabled systems to operate with unintended consequences?