Question 204
Question 204
A systems administrator uses a key to encrypt a message being sent to a peer in a different branch office. The peer
then uses the same key to decrypt the message. Which of the following describes this example?
A. Symmetric
B. Asymmetric
C. Hashing
D. Salting
Answer: A
Question 205
Which of the following threat actors is the most likely to be motivated by profit?
A. Hacktivist
B. Insider threat
C. Organized crime
D. Shadow IT
Answer: C
Question 206
A network administrator is working on a project to deploy a load balancer in the company's cloud environment. Which
of the following fundamental security requirements does this project fulfil?
A. Privacy
B. Integrity
C. Confidentiality
D. Availability
Answer: D
Question 207
A systems administrator is advised that an external web server is not functioning property. The administrator reviews
the following firewall logs containing traffic going to the web server:
A. DDoS
B. Directory traversal
C. Brute-force
D. HTTPS downgrade
Answer: A
Question 208
Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than
the impact of the risk?
A. ARO
B. RTO
C. RPO
D. ALE
E. SLE
Answer: D
Question 209
A security administrator is reissuing a former employee's laptop. Which of the following is the best combination of
data handling activities for the administrator to perform? (Choose two.)
A. Data retention
B. Certification
C. Destruction
D. Classification
E. Sanitization
F. Enumeration
Answer: BE
Question 210
A company is redesigning its infrastructure and wants to reduce the number of physical servers in use. Which of the
following architectures is best suited for this goal?
A. Serverless
B. Segmentation
C. Virtualization
D. Microservices
Answer: C
Question 211
A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network. Which of the
following should be configured on the existing network infrastructure to best prevent this activity?
A. Port security
B. Web application firewall
C. Transport layer security
D. Virtual private network
Answer: A
Question 212
A systems administrator would like to deploy a change to a production system. Which of the following must the
administrator submit to demonstrate that the system can be restored to a working state in the event of a performance
issue?
A. Backout plan
B. Impact analysis
C. Test procedure
D. Approval procedure
Answer: A