Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network?
Which of the following technical controls helps to prevent Smartphones from connecting to a
corporate network?
which of the following?
Incoming data is detected as duplicate and is removed, allowing reduction of storage
consumption. This is called which of the following?
Which of the following aspects of PKI BEST ensures the identity of the sender?
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never
sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?
Which of the following BEST meets the requirements?
The Chief Risk Officer is concerned about the new employee BYOD device policy and has
requested the security department implement mobile security controls to protect corporate data in
the event that a device is lost or stolen. The level of protection must not be compromised even if
the communication SIM is removed from the device. Which of the following BEST meets the
requirements? (Select TWO).
which of the following?
Buffer-to-buffer credit is used for which of the following?
Which of the following is designed to stop an intrusion on a specific server?
Jane, a security administrator, has observed repeated attempts to break into a server. Which of
the following is designed to stop an intrusion on a specific server?
Which of the following are current rotational speeds for Fibre Channel and SAS based hard drives?
Which of the following are current rotational speeds for Fibre Channel and SAS based hard
drives? (Select TWO)
A way to assure data at-rest is secure even in the event of loss or theft is to use:
A way to assure data at-rest is secure even in the event of loss or theft is to use:
How could this BEST be accomplished?
Matt, the IT Manager, wants to create a new network available to virtual servers on the same
hypervisor, and does not want this network to be routable to the firewall. How could this BEST be
accomplished?
Which of the following MUST be done in order to connect the LUNs to the replacement HBA?
A system administrator has recently replaced a failed redundant HBA. Which of the following
MUST be done in order to connect the LUNs to the replacement HBA?