How much usable disk space will this array have?
A server consists of two 72GB SCSI drives and four 146GB SCSI drives. All drives are attached to a RAID controller. The system administrator has decided to configure all six drives in a RAID 5 array. How much usable disk space will this array have?
Which of the following could be used?
A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?
Which of the following is an example of security personnel that administer access control functions, but do no
Which of the following is an example of security personnel that administer access control functions, but do not administer audit functions?
Which of the following would explain why User A could not access the file?
User A is a member of the payroll security group. Each member of the group should have read/write permissions to a share. User A was trying to update a file but when the user tried to access the file the user was denied. Which of the following would explain why User A could not access the file?
Which of the following methods is used to perform denial of service (DoS) attacks?
Which of the following methods is used to perform denial of service (DoS) attacks?
Which of the following is an exploit against a device where only the hardware model and manufacturer are known
Which of the following is an exploit against a device where only the hardware model and manufacturer are known?
Which of the following tools will allow the technician to find all open ports on the network?
Which of the following tools will allow the technician to find all open ports on the network?
Which of the following should a technician recommend to prevent physical access to individual office areas?
Which of the following should a technician recommend to prevent physical access to individual office areas? (Select TWO).
Which of the following should the technician use to correct this problem?
After issuance a technician becomes aware that some keys were issued to individuals who are not authorized to use them. Which of the following should the technician use to correct this problem?
Which of following can BEST be used to determine the topology of a network and discover unknown devices?
Which of following can BEST be used to determine the topology of a network and discover unknown devices?