Which of the following MUST be done before any actual switch configuration is performed?
A security administrator needs to update the OS on all the switches in the company. Which of the
following MUST be done before any actual switch configuration is performed?
which of the following devices in order to share an FC storage system with multiple servers on a SAN?
An IT Administrator needs to have which of the following devices in order to share an FC storage
system with multiple servers on a SAN?
Which of the following is the BEST method of preventing future violations?
Management has been informed of an increased number of tailgating violations into the server
room. Which of the following is the BEST method of preventing future violations?
Which of the following attacks is being described?
Jane, an individual, has recently been calling various financial offices pretending to be another
person to gain financial information. Which of the following attacks is being described?
Which of the following MOST likely occurred?
After a cleaning person left the network room, one of the paths to the SAN from Server A is no
longer working. The redundant path is working fine. The cables are all connected securely but the
HBA fault light is on. The switch shows no light on that port. Which of the following MOST likely
occurred?
Which of the following security controls will MOST likely be implemented within the company?
A user in the company is in charge of various financial roles but needs to prepare for an upcoming
audit. They use the same account to access each financial system. Which of the following security
controls will MOST likely be implemented within the company?
Which of the following would prevent her from denying accountability?
Ann, a newly hired human resource employee, sent out confidential emails with digital signatures,
to an unintended group. Which of the following would prevent her from denying accountability?
Which of the following Fibre Channel feature allows Virtual Machines to be seen individual^ on the fabric?
Which of the following Fibre Channel feature allows Virtual Machines to be seen individual^ on the
fabric?
A CRL is comprised oF.
A CRL is comprised oF.
Which of the following will accomplish this task securely?
Ann would like to forward some Personal Identifiable Information to her HR department by email,
but she is worried about the confidentiality of the information. Which of the following will
accomplish this task securely?