Which IDPS technique uses a database that contains known attack patterns?
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns? A. Role-based B. Profile-based C. Signature-based D. Anomaly-based Reference: https://pdfs.semanticscholar.org/e874/32283e90da5bceb3b17550570ec3a210f43c.pdf
What is a key advantage of cloning a virtual machine (VM)?
What is a key advantage of cloning a virtual machine (VM)? A. Ability to run new VMs simultaneously with the same IP address. B. Reduces the time required to create multiple copies of a VM. C. Improves the performance of an existing VM and new VMs. D. Eliminates the need to create multiple snapshots for […]
What is the maximum number of disk drive failures against which data is protected by the configuration?
When using the erasure coding technique in an object-based storage system, data is divided into 12 data segments and 4 coding segments. What is the maximum number of disk drive failures against which data is protected by the configuration? A. 3 B. 4 C. 8 D. 12
What accurately describes an iSCSI HBA?
What accurately describes an iSCSI HBA? A. Performs both iSCSI and TCP/IP processing B. Requires CPU cycles for TCP/IP processing C. Requires a software adapter with built-in functionality D. Enables transmission of data through iSCSI tunneling Reference: https://www.dell.com/downloads/global/power/ps4q09-20090419-McConnell.pdf
What is the MTTR of Port 4?
An Ethernet switch has eight ports and all ports must be operational for 24 hours, from Monday through Friday. However, a failure of Port4 occurs as follows: • Monday = 8 PM to 9 PM • Wednesday 7 PM to 9 PM • Thursday = 6 AM to 9 AM • Saturday = 4 PM […]
Which exhibit represents a Type 1 hypervisor?
Which exhibit represents a Type 1 hypervisor? A. B. C. D.
What is an accurate statement about Governance?
What is an accurate statement about Governance? A. Restrict access to certain users B. Ensure removal of security risks C. Authorize policy-making decisions D. Demonstrate adherence to polices