Question 41
A malicious insider from the marketing team alters records and transfers company funds to a personal account. Which of the following methods would be the best way to secure company records in the future?
Question 42
A company wants to verify that the software the company is deploying came from the vendor the company purchased the software from. Which of the following is the best way for the company to confirm this information?
Question 43
Which of the following would enable a data center to remain operational through a multiday power outage?
Question 44
Which of the following best describes why me SMS DIP authentication method is more risky to implement than the TOTP method?
Question 45
A security analyst needs to improve the company's authentication policy following a password audit. Which of the following should be included in the policy? (Select two).
