Question 21

Several universities are participating m a collaborative research project and need to share compute and storage resources Which of the following cloud deployment strategies would BEST meet this need?
  • Question 22

    If a current private key is compromised, which of the following would ensure it cannot be used to decrypt all historical data?
  • Question 23

    A company recently experienced a significant data loss when proprietary Information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An Investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage.
    Which of the following is the BEST remediation for this data leak?
  • Question 24

    A security analyst has been tasked with creating a new WiFi network for the company. The requirements received by the analyst are as follows:
    - Must be able to differentiate between users connected to WiFi
    - The encryption keys need to change routinely without interrupting the users or forcing reauthentication
    - Must be able to integrate with RADIUS
    - Must not have any open SSIDs
    Which of the following options BEST accommodates these requirements?
  • Question 25

    After a hardware incident, an unplanned emergency maintenance activity was conducted to rectify the issue. Multiple alerts were generated on the SIEM during this period of time.
    Which of the following BEST explains what happened?