which of the following could be implemented without increasing the amount of space required at the entrance?
A security administrator is tackling issues related to authenticating users at a remote site. There
have been a large number of security incidents that resulted from either tailgating or impersonation
of authorized users with valid credentials. The security administrator has been told to implement
multifactor authentication in order to control facility access. To secure access to the remote facility,
which of the following could be implemented without increasing the amount of space required at
the entrance?
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS l
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP
using a POTS line?
Which of the following actions should the administrator take?
The security administrator notices a user logging into a corporate Unix server remotely as root.
Which of the following actions should the administrator take?
Which of the following actions could the administrator take to improve the performance of data transfers over
An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of
the following actions could the administrator take to improve the performance of data transfers
over iSCSI switches?
Which of the following is MOST appropriate to use?
A company plans to expand by hiring new engineers who work in highly specialized areas. Each
engineer will have very different job requirements and use unique tools and applications in their
job. Which of the following is MOST appropriate to use?
which of the following?
A network topology that utilizes a central device with point-to-point connections to all other devices
is which of the following?
Which of the following should be modified to assure that Ann has read access to the file?
A file on a Linux server has default permissions of rw-rw-r–. The system administrator has verified
that Ann, a user, is not a member of the group owner of the file. Which of the following should be
modified to assure that Ann has read access to the file?
Which of the following technologies will be used to encapsulate the frames?
A technician is connecting a NAS device to an Ethernet network. Which of the following technologies
will be used to encapsulate the frames?
Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key
Which of the following protocols uses an asymmetric key to open a session and then establishes a
symmetric key for the remainder of the session?
Which of the following would BEST handle the rerouting caused by the disruption of service?
The network install is failing redundancy testing at the MDF. The traffic being transported is a
mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting
caused by the disruption of service?