SY0-601 Exam Question 76
A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST after recovery?
SY0-601 Exam Question 77
Which of the following algorithms has the SMALLEST key size?
SY0-601 Exam Question 78
An enterprise has hired an outside security firm to conduct penetration testing on its network and applications.
The firm has only been given the documentation available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?
The firm has only been given the documentation available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?
SY0-601 Exam Question 79
Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?
SY0-601 Exam Question 80
When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?
