Which of the following technologies should be recommended to detect such anomalies?
The Chief Technical Officer (CTO) is worried about an increased amount of malware detected on
end user’s workstations. Which of the following technologies should be recommended to detect
such anomalies?
Which of the following is MOST likely the issue?
An administrator cannot get the initiator to discover an iSCSI target. The switch displays all green
lights on the port but by moving the cable from one port on the switch to another, the initiator
discovers the target. Which of the following is MOST likely the issue?
Which of the following would a security administrator implement in order to discover comprehensive security th
Which of the following would a security administrator implement in order to discover
comprehensive security threats on a network?
Which of the following types of IDS has been deployed?
The network security engineer just deployed an IDS on the network, but the Chief Technical
Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the
following types of IDS has been deployed?
Which of die following steps should be performed NEXT?
A host-based logical volume manager is used to migrate data from an old array to a newer one.
The storage administrator has completed the physical connections, zoning, and masking, but the
storage volumes from the new array are still not visible on the host. Which of die following steps
should be performed NEXT?
Which of the following is an example of a false positive?
Which of the following is an example of a false positive?
Which of the following technologies would BEST allow a technician to replace the failed disk without interrup
One of the disks in a RAID 5 configuration on a NAS device has failed. Which of the following
technologies would BEST allow a technician to replace the failed disk without interrupting service
to the device?
Which of the following is the BEST method to deter employees from the improper use of the company’s informat
Joe, a newly hired employee, has a corporate workstation that has been compromised due to
several visits to P2P sites. Joe insisted that he was not aware of any company policy that prohibits
the use of such web sites. Which of the following is the BEST method to deter employees from the
improper use of the company’s information systems?
which type of attack?
Data execution prevention is a feature in most operating systems intended to protect against
which type of attack?
which of the following should the storage administrator do to support that configuration?
A pair of SAN-attached servers will be clustered using host clustering, which of the following
should the storage administrator do to support that configuration?