SY0-601 Exam Question 61
On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)
SY0-601 Exam Question 62
A security engineer is reviewing log files after a third discovered usernames and passwords for the organization's accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?
SY0-601 Exam Question 63
An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization's needs for a third factor?
SY0-601 Exam Question 64
Which of the following refers to applications and systems that are used within an organization without consent or approval?
SY0-601 Exam Question 65
A company wants to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the BEST backup strategy to implement?