1. A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider?
A. Geographic dispersion Correct
B. Platform diversity
C. Hot site
D. Load balancing
Explanation
Geographic dispersion involves placing backup data in a physically separate location, ensuring that a natural disaster like a hurricane or earthquake affecting the primary site does not destroy the backup data. This approach directly addresses the need to protect regulated data from complete loss. Platform diversity focuses on using different technologies, which doesn't prevent data loss from disasters. A hot site is a fully operational backup site but doesn't inherently address geographic separation. Load balancing distributes network traffic but is unrelated to disaster recovery.
2. Which of the following should be used to ensure that a device is inaccessible to a network-connected resource?
A. Disablement of unused services
B. Web application firewall
C. Host isolation Correct
D. Network-based IDS
Explanation
Host isolation physically or logically disconnects a device from the network, making it inaccessible to network-connected resources. This is the most direct method to achieve the goal. Disabling unused services reduces attack surfaces but doesn't fully prevent network access. A web application firewall protects web applications, not individual devices. A network-based IDS detects intrusions but does not block access.
3. A company receives an alert that a network device vendor, which is widely used in the enterprise, has been banned by the government. Which of the following will the company’s general counsel most likely be concerned with during a hardware refresh of these devices?
A. Sanctions Correct
B. Data sovereignty
C. Cost of replacement
D. Loss of license
Explanation
A government ban on a vendor typically involves sanctions, which are legal restrictions that could lead to compliance violations or penalties if the banned devices are used. The general counsel, focused on legal risks, would prioritize this concern. Data sovereignty relates to data storage locations, cost of replacement is a financial concern, and loss of license is less relevant as the ban would supersede licensing issues.
4. A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?
A. Deploying PowerShell scripts
B. Pushing GPO update Correct
C. Enabling PAP
D. Updating EDR profiles
Explanation
Group Policy Objects (GPOs) in a Windows environment allow administrators to centrally and rapidly enforce password policies across all systems in an Active Directory domain. This is faster and more efficient than deploying PowerShell scripts, which require individual execution. Enabling PAP (Password Authentication Protocol) is insecure and irrelevant, and updating EDR profiles focuses on endpoint detection, not password policies.
5. Which of the following attacks primarily targets insecure networks?
A. Evil twin Correct
B. Impersonation
C. Watering hole
D. Pretexting
Explanation
An evil twin attack involves creating a rogue Wi-Fi access point that mimics a legitimate network, exploiting insecure wireless networks to intercept data. Impersonation, watering hole, and pretexting target users through social engineering or compromised websites, not specifically insecure networks.