Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

100-160 Questions and Answers

Question # 6

You are reviewing your company’s disaster recovery plan.

Which two daily data backup actions should the plan include?(Choose 2.)

A.

Back up the data to removable media and store it off-site.

B.

Back up each department’s data to a separate local server.

C.

Back up the data by using cloud services.

D.

Back up the data by using RAID on a local external hard drive with a secondary power source.

Full Access
Question # 7

You need to transfer configuration files to a router across an unsecured network.

Which protocol should you use to encrypt the files in transit?

A.

Telnet

B.

HTTP

C.

TFTP

D.

SSH

Full Access
Question # 8

You need a software solution that performs the following tasks:

    Compiles network data

    Logs information from many sources

    Provides orchestration in the form of case management

    Automates incident response workflows

What product should you use?

A.

SIEM

B.

SOAR

C.

NextGen IPS

D.

Snort

Full Access
Question # 9

Your manager asks you to review the output of some vulnerability scans and report anything that may require escalation.

Which two findings should you report for further investigation as potential security vulnerabilities?(Choose 2.)

A.

Encrypted passwords

B.

Disabled firewalls

C.

Open ports

D.

SSH packets

Full Access
Question # 10

A SOC analyst notices repeated failed login attempts from a foreign IP address followed by a successful login to a privileged account. What is the most appropriate next step?

A.

Reset the affected user’s password and investigate the scope of compromise.

B.

Block all foreign IP addresses from accessing the network.

C.

Run a full vulnerability scan of the corporate network.

D.

Ignore the event unless it happens again.

Full Access
Question # 11

Move each scenario from the list on the left to the correct type of attacker on the right.

Note: You will receive partial credit for each correct answer.

Full Access
Question # 12

For each statement, selectTrueif it is a common motivation to commit cyber attacks orFalseif it is not.

Note: You will receive partial credit for each correct selection.

Full Access
Question # 13

Your supervisor tells you that you will participate in a CVSS assessment.

What will you be doing?

A.

Performing penetration tests on internal network devices and end systems

B.

Analyzing host logs to identify abnormal activities

C.

Interviewing users to determine their level of cybersecurity awareness

D.

Evaluating end system security and scoring software vulnerabilities

Full Access
Question # 14

Which network security technology passively monitors network traffic and compares the captured packet stream with known malicious signatures?

A.

IDS

B.

IPS

C.

Proxy Server

D.

Honeypot

Full Access
Question # 15

Which encryption type is commonly used to secure WiFi networks?

A.

Data Encryption Standard (DES)

B.

Triple Data Encryption Algorithm (Triple DES)

C.

Advanced Encryption Algorithm (AES)

D.

RSA (Rivest–Shamir–Adleman)

Full Access