Which of the following is the MOST secure protocol to transfer files?
Which of the following is the MOST secure protocol to transfer files?
Which of the following would prevent this problem in the future?
A user’s remote connection halts every time large sequential files are transferred to and from a
specific server running 1 Gb/s iSCSI. The administrator has found no fault with the network, and
during these transfers the network utilization of the switch port is very high. After the transfer is
complete the user is able to reconnect to the server via terminal services. Which of the following
would prevent this problem in the future? (Select TWO).
Which of the following would allow the organization to divide a Class C IP address range into several ranges?
Which of the following would allow the organization to divide a Class C IP address range into
several ranges?
Which of the following security devices needs to be configured to disable future false alarms?
Suspicious traffic without a specific signature was detected. Under further investigation, it was
determined that these were false indicators. Which of the following security devices needs to be
configured to disable future false alarms?
Which of the following storage types is BEST suited for data immutability?
Which of the following storage types is BEST suited for data immutability?
Which of the following administrative controls should be implemented to BEST achieve this?
A company storing data on a secure server wants to ensure it is legally able to dismiss and
prosecute staff who intentionally access the server via Telnet and illegally tamper with customer
data. Which of the following administrative controls should be implemented to BEST achieve this?
Which of the following protocols could be used to secure communication by offering encryption at a lower OSI l
A company’s legacy server requires administration using Telnet. Which of the following protocols
could be used to secure communication by offering encryption at a lower OSI layer? (Select
TWO).
Which of the following is causing the problem?
After installing a server based application, an administrator is failing to connect from their desktop.
The administrator is able to ping the server by both IP and DNS name. Which of the following is
causing the problem?
Which of the following protocols is used to authenticate the client and server’s digital certificate?
Which of the following protocols is used to authenticate the client and server’s digital certificate?
Which of the following types of technologies will BEST address this scenario?
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the
corporate network. He has tasked the security engineers to implement a technology that is
capable of alerting the team when unusual traffic is on the network. Which of the following types of
technologies will BEST address this scenario?