Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a
mobile device?
Which of the following cable options should be used?
The technician has been told to install a cable between buildings for a new4Gbps link. The
distance between the buildings is approximate^ 500 meters (1640 feet). Which of the following
cable options should be used?
Which of the following should be used to accomplish this task?
Pete, an employee, is terminated from the company and the legal department needs documents
from his encrypted hard drive. Which of the following should be used to accomplish this task?
(Select TWO).
Which of the following would BEST fit her objective?
Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure
protocol, which can utilize EAP. Which of the following would BEST fit her objective?
which of the following?
Host-based volume management can be used to virtualize which of the following?
Which of the following mitigation strategies is established to reduce risk when performing updates to business
Which of the following mitigation strategies is established to reduce risk when performing updates
to business critical systems?
which of the following as a mitigation method against further attempts?
Joe analyzed the following log and determined the security team should implement which of the
following as a mitigation method against further attempts?
Host 192.168.1.123
[00:00:01]Successful Login: 015 192.168.1.123 : local
[00:00:03]Unsuccessful Login: 022 214.34.56.006 :RDP 192.168.1.124
[00:00:04]UnSuccessful Login: 010 214.34.56.006 :RDP 192.168.1.124
[00:00:07]UnSuccessful Login: 007 214.34.56.006 :RDP 192.168.1.124
[00:00:08]UnSuccessful Login: 003 214.34.56.006 :RDP 192.168.1.124
Which of the following additional steps should the administrator take?
An administrator installs a second HBA into a server for redundancy. Now the server is reporting
that there are two storage devices available whereas before there was only one. Which of the
following additional steps should the administrator take?
Which of the following can Pete, a security administrator, use to distribute the processing effort when genera
Which of the following can Pete, a security administrator, use to distribute the processing effort
when generating hashes for a password cracking program?
which of the following techniques should be used?
A storage administrator is tasked with creating a disaster recovery solution for an application with
Recovery Time Objective (RTO) of two minutes and Recovery Point Objective (RPOJ of five
minutes. In the event of complete site failure which of the following techniques should be used?
(Select TWO).