CompTIA Related Exams
CS0-002 Exam

A security analyst notices the following proxy log entries:
Which of the following is the user attempting to do based on the log entries?
A security analyst is reviewing the following Internet usage trend report:
Which of the following usernames should the security analyst investigate further?
A Chief Executive Officer (CEO) is concerned the company will be exposed to data sovereignty issues as a result of some new privacy regulations to help mitigate this risk. The Chief Information Security Officer (CISO) wants to implement an appropriate technical control. Which of the following would meet the requirement?