Question 571

After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?
  • Question 572

    A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:

    Which of the following is the most likely way a rogue device was allowed to connect?
  • Question 573

    A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?
  • Question 574

    Which of the following can be used to identify potential attacker activities without affecting production servers?
  • Question 575

    A systems administrator is redesigning now devices will perform network authentication. The following requirements need to be met:
    * An existing Internal certificate must be used.
    * Wired and wireless networks must be supported
    * Any unapproved device should be Isolated in a quarantine subnet
    * Approved devices should be updated before accessing resources
    Which of the following would best meet the requirements?