Which of the following is a form of photo identification used to gain access into a secure location?
Which of the following is a form of photo identification used to gain access into a secure location?
Which of the following could be implemented to prevent this security concern?
Several staff members working in a datacenter have reported instances of tailgating. Which of the
following could be implemented to prevent this security concern?
which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
By default, which of the following stops network traffic when the traffic is not identified in the
firewall ruleset?
Which of the following configurations will allow for high availability?
A security administrator is tasked with ensuring that all servers are highly available and that hard
drive failure will not affect an individual server. Which of the following configurations will allow for
high availability? (Select TWO).
which of the following protocols uses multiple-challenge responses for authentication, authorization and audit
When granting access, which of the following protocols uses multiple-challenge responses for
authentication, authorization and audit?
Which of the following port numbers is used for SCP, by default?
Which of the following port numbers is used for SCP, by default?
Which of the following devices is used to optimize and distribute data workloads across multiple computers or
Which of the following devices is used to optimize and distribute data workloads across multiple
computers or networks?
Which of the following is the BEST security control that should be performed in conjunction with updating the
A business-critical application will be installed on an Internet facing server. Which of the following
is the BEST security control that should be performed in conjunction with updating the application
to the MOST current version?
Which of the following is a trusted OS implementation used to prevent malicious or suspicious code from execut
Which of the following is a trusted OS implementation used to prevent malicious or suspicious
code from executing on Linux and UNIX platforms?
Which of the following assists in identifying if a system was properly handled during transport?
Which of the following assists in identifying if a system was properly handled during transport?