Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

EMC D-SF-A-24 - Dell Security Foundations Achievement

Page: 1 / 1
Total 20 questions

In the cloud, there are numerous configuration options for the services provided. If not properly set, these configurations can leave the environment in an unsecure state where an attacker can read and modify the transmitted data packets and send their own requests to the client.

Which types of attack enable an attacker to read and modify the transmitted data packets and send their own requests to the client?

A.

Data loss

B.

Shared technology

C.

TCP hijacking

D.

Dumpster diving

The security team recommends the use of User Entity and Behavior Analytics (UEBA) in order to monitor and detect unusual traffic patterns, unauthorized data access, and malicious activity ofA .R.T.I.E.The monitored entities includeA .R.T.I.E.processes, applications, and network devices Besides the use of UEBA, the security team suggests a customized and thorough implementation plan for the organization.

What are the key attributes that define UEBA?

A.

User analytics, threat detection, and data.

B.

User analytics, encryption, and data.

C.

Encryption, automation, and data.

D.

Automation, user analytics, and data.

A .R.T.I.E.is planning to deploy some of their applications in a public cloud. A major concern is how to share and protect data off premises. Also, how data can be used in decision making without exposing it to anyone who should not have access. Dell Services briefed them about various control mechanisms to secure data in the public cloud.

Which control mechanism should be selected in this scenario?

A.

Proactive control mechanism

B.

Detective control mechanism

C.

Corrective control mechanism

During the analysis, the threat intelligence team disclosed that attackers not only encrypted files, but also attempted to encrypt backups and shared, networked, and cloud drives.

Which type of ransomware is used for this attack?

A.

Cryptolocker

B.

Double extortion

C.

Crypto

D.

Locker

An externalA .R.T.I.E.user requires access to sensitive resources and data.

Which authentication technique should be best recommended to provide access to this business user?

A.

Two-factor

B.

Privileged Access Management

C.

Multifactor

D.

Single Sign-On

Which framework should be recommended toA .R.T.I.E.to enhance the overall security and resilience of their critical infrastructure, and outline methods to reduce their cybersecurity risk?

A.

NIST CSF

B.

COBIT

C.

PCIDSS

D.

HIPAA