Question 631
A company is migrating systems from an on-premises facility to a third-party managed datacenter. For continuity of operations and business agility, remote access to all hardware platforms must be available at all times. Access controls need to be very robust and provide an audit trail. Which of the following security controls will meet the company's objectives? (Select two.)
Question 632
Which of the following provides the BEST risk calculation methodology?
Question 633
An attacker attempts to create a DoS event against the VoIP system of a company. The attacker uses a tool to flood the network with a large number of SIP INVITE traffic. Which of the following would be LEAST likely to thwart such an attack?
Question 634
A system owner has requested support from data owners to evaluate options for the disposal of equipment containing sensitive data. Regulatory requirements state the data must be rendered unrecoverable via logical means or physically destroyed.
Which of the following factors is the regulation intended to address?
Question 635
An organization's network engineering team recently deployed a new software encryption solution to
ensure the confidentiality of data at rest, which was found to add 300ms of latency to data read-write
requests in storage, impacting business operations.
Which of the following alternative approaches would BEST address performance requirements while
meeting the intended security objective?