Which of the following would be used to stop unauthorized access?
At an organization, unauthorized users have been accessing network resources via unused
network wall jacks. Which of the following would be used to stop unauthorized access?
Certificates are used for: (Select TWO).
Certificates are used for: (Select TWO).
Which of the following is the BEST media to quickly backup a portable 30 GB file?
Which of the following is the BEST media to quickly backup a portable 30 GB file?
Which of the following is a hardware based encryption device?
Which of the following is a hardware based encryption device?
Which of the following is blocking network printing?
Users report that they are unable to access network printing services. The security technician
checks the router access list and sees that web, email, and secure shell are allowed. Which of the
following is blocking network printing?
Which of the following is a meshed topology of server nodes, switches, and storage nodes?
Which of the following is a meshed topology of server nodes, switches, and storage nodes?
Which of the following BEST describes a protective countermeasure for SQL injection?
Which of the following BEST describes a protective countermeasure for SQL injection?
Which of the following should Joe search for in the log files?
Joe, a security administrator, believes that a network breach has occurred in the datacenter as a
result of a misconfigured router access list, allowing outside access to an SSH server. Which of
the following should Joe search for in the log files?
how many connections would the administrator need to connect the array to the environment?
Given the below system requirements:
– Two Fabrics
– Each fabric has 4 switches, 1 core director and 3 edge switches
– A new storage array is being added
– HA environment that is fully redundant
Where would a storage administrator MOST likely place the storage and how many connections
would the administrator need to connect the array to the environment?
Which of the following MOST interferes with network-based detection techniques?
Which of the following MOST interferes with network-based detection techniques?