SY0-601 Exam Question 251
A SOC is implementing an insider-threat-detection program. The primary concern is that users may be accessing confidential data without authorization. Which of the following should be deployed to detect a potential insider threat?
SY0-601 Exam Question 252
A large enterprise has moved all its data to the cloud behind strong authentication and encryption. A sales director recently had a laptop stolen, and later, enterprise data was found to have been compromised from a local database. Which of the following was the MOST likely cause?
SY0-601 Exam Question 253
A security assessment determines DES and 3DES at still being used on recently deployed production servers.
Which of the following did the assessment identify?
Which of the following did the assessment identify?
SY0-601 Exam Question 254
A security policy states that common words should not be used as passwords. A security auditor was able to perform a dictionary attack against corporate credentials Which of the following controls was being violated?
SY0-601 Exam Question 255
After a ransomware attack a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?
