Which of the following is the MOST likely issue?
A storage administrator is troubleshooting lack of connectivity between an iSCSI-initator and
iSCSI-target that is located behind a firewall. The firewall has the following active rule base:
Allow udp port 3260
Allow tcp port 443
Allow icmp all
Deny all
Which of the following is the MOST likely issue?
which of the following?
Sara, a company’s security officer, often receives reports of unauthorized personnel having
access codes to the cipher locks of secure areas in the building. Sara should immediately
implement which of the following?
Which of the following is the BEST concept to maintain required but non-critical server availability?
Which of the following is the BEST concept to maintain required but non-critical server availability?
Which of the following computes a combined value of all pages and stamps the value on the tape media to be use
Which of the following computes a combined value of all pages and stamps the value on the tape
media to be used to verify that whole backup?
Which of the following would be BEST suited for this task?
Mike, a network administrator, has been asked to passively monitor network traffic to the
company’s sales websites. Which of the following would be BEST suited for this task?
Which of the following would MOST easily prevent zoning conflicts and fabric segmentation?
Which of the following would MOST easily prevent zoning conflicts and fabric segmentation?
Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe’s home address
Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family
in the house living room. Joe posts the picture on a popular social media site together with the
messagE. “Heading to our two weeks vacation to Italy.” Upon returning home, Joe discovers that
the house was burglarized. Which of the following is the MOST likely reason the house was
burglarized if nobody knew Joe’s home address?
Which of the following activities is MOST appropriate?
Mike, a security professional, is tasked with actively verifying the strength of the security controls
on a company’s live modem pool. Which of the following activities is MOST appropriate?
which of the following solutions would provide the MOST redundancy and high availability options?
From a disaster recovery perspective, which of the following solutions would provide the MOST
redundancy and high availability options?
which of the following?
Users at a company report that a popular news website keeps taking them to a web page with
derogatory content. This is an example of which of the following?