Which of the following would be the BEST technology control to use in this scenario?
A company is trying to limit the risk associated with the use of unapproved USB devices to copy
documents. Which of the following would be the BEST technology control to use in this scenario?
Which of the following features can automatically facilitate a vendor service call in the event of a SAN compo
Which of the following features can automatically facilitate a vendor service call in the event of a
SAN component failure?
Which of the following should he do to segment that traffic from the other traffic?
Pete, a network administrator, is capturing packets on the network and notices that a large amount
of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment
that traffic from the other traffic?
Which of the following will restore communication between the servers’ network and the SAN?
In order to protect the storage area network, a new firewall has been installed at the company’s
datacenter. Once installed, all servers lost the remote storage and crashed. Which of the following
will restore communication between the servers’ network and the SAN?
Which of the following controls could they implement to BEST meet this goal?
A company’s employees were victims of a spear phishing campaign impersonating the CEO. The
company would now like to implement a solution to improve the overall security posture by
assuring their employees that email originated from the CEO. Which of the following controls could
they implement to BEST meet this goal?
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224?
Which of the following IP addresses would be hosts on the same subnet given the subnet mask
255.255.255.224? (Select TWO).
Which of the following features describes this strategy?
An administrator would like to employ a strategy to use SAN space more efficiently. Data that has
a high I/O and is accessed often should be moved to SSD and Fiber Channel drives while data
accessed less often should be moved to the higher capacity SATA drives. Which of the following
features describes this strategy?
Which of the following algorithms has well documented collisions?
Which of the following algorithms has well documented collisions? (Select TWO).
Which of the following is a security risk regarding the use of public P2P as a method of collaboration?
Which of the following is a security risk regarding the use of public P2P as a method of
collaboration?
Which of the following describes an ISL connection?
Which of the following describes an ISL connection?