Which of the following configurations will allow for high availability? (Select TWO).
A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability? (Select TWO).
By default, which of the following stops network traffic when the traffic is not identified in the firewall ru
By default, which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Which of the following could be implemented to prevent this security concern?
Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Which of the following is a form of photo identification used to gain access into a secure location?
Which of the following is a form of photo identification used to gain access into a secure location?
Which of the following security technologies could be used to provide remote access? (Select TWO).
In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO).
Which of the following represents the complexity of a password policy which enforces lower case password using
Which of the following represents the complexity of a password policy which enforces lower case password using letters from ‘a’ through ‘z’ where ‘n’ is the password length?
Which of the following is MOST commonly a part of routine system audits?
Which of the following is MOST commonly a part of routine system audits?
Which of the following encryption types would protect this information from disclosure if lost or stolen?
An employee stores their list of passwords in a spreadsheet on their local desktop hard drive. Which of the following encryption types would protect this information from disclosure if lost or stolen?
Which of the following describes this form of access control?
Reviewing an access control list on a firewall reveals a Drop All statement at the end of the rules. Which of the following describes this form of access control?
The BEST way to protect the confidentiality of sensitive data entered in a database table is to use:
The BEST way to protect the confidentiality of sensitive data entered in a database table is to use: