Which of the following kind of IDS is in use?
Four weeks ago a network administrator applied a new IDS and allowed it to gather baseline data.
As rumors of a layoff begins to spread, the IDS alerted the network administrator that access to
sensitive client files had risen for above normal. Which of the following kind of IDS is in use?
Which of the following could an administrator use to ensure that unauthorized devices are not allowed to acces
A BYOD policy in which employees are able to access the wireless guest network is in effect in an
organization. Some users however are using the Ethernet port in personal laptops to the wired
network. Which of the following could an administrator use to ensure that unauthorized devices
are not allowed to access the wired network?
Which of the following would BEST ensure the availability of the employee database should happen to the server
During an office move a sever containing the employee information database will be shut down
and transported to a new location. Which of the following would BEST ensure the availability of the
employee database should happen to the server during the move?
Which of the following is primarily used to provide fault tolerance at the application level?
Which of the following is primarily used to provide fault tolerance at the application level? (Select
TWO)
Which of the following cipher suites should the administrator select to accomplish this goal?
A security administrator would like the corporate webserver to select perfect forward secrecy
ciphers first. Which of the following cipher suites should the administrator select to accomplish this
goal?
Which of the following is missing?
An administrator is having difficulty configuring WPA2 Enterprise using EAP-PEAP-MSCHAPv2.
The administrator has configured the wireless access points properly, and has configured policies
on the RADIUS server and configured settings on the client computers. Which of the following is
missing?
Which of the following is the MOST likely cause of this dispute?
A business has recently adopted a policy allowing employees to use personal cell phones and
tablets to access company email accounts while out of the office. Joe an employee was using a
personal cell phone for email access and was recently terminated. It is suspected that Joe saved
confidential client emails on his personal cell phone. Joe claims that the data on the phone is
completely personal and refuse to allow the company access to inspect the cell phone. Which of
the following is the MOST likely cause of this dispute?
Which of the following would BEST prevent these issues from reoccurring?
Mobile tablets are used by employees on the sales floor to access customer data. Ann a customer
recently reported that another customer was able to access her personal information on the tablet
after the employee left the area. Which of the following would BEST prevent these issues from
reoccurring?
Which of the following metrics is important for measuring the extent of data required during backup and recove
Which of the following metrics is important for measuring the extent of data required during backup
and recovery?
Which of the following can be used to ensure that sensitive records stored on a backend server can only be acc
Which of the following can be used to ensure that sensitive records stored on a backend server
can only be accessed by a front end server with the appropriate record key?