Which of the following is this an example of?
A computer supply company is located in a building with three wireless networks. The system
security team implemented a quarterly security scan and saw the following. Which of the following
is this an example of?
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with for
Which of the following should Jane, a security administrator, perform before a hard drive is
analyzed with forensics tools?
Which of the following should be investigated to determine potential causes?
A new SAN volume has been presented and mounted on a server, but poor write performance is
exhibited. Which of the following should be investigated to determine potential causes?
Which of the following would BEST help Jane when deploying a new access point?
Jane, an administrator, needs to make sure the wireless network is not accessible from the
parking area of their office. Which of the following would BEST help Jane when deploying a new
access point?
Which of the following actions should Joe recommend?
Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles
during the week. Further investigation by the system engineering team determined that a timed
.exe file had been uploaded to the system control console during a visit by international
contractors. Which of the following actions should Joe recommend?
Which of the following should the system administrator perform to see the newly created storage from the serve
A system administrator has added a new LUN and is unable to see the storage from a server.
Which of the following should the system administrator perform to see the newly created storage
from the server?
Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?
Which of the following allows Pete, a security technician, to provide the MOST secure wireless
implementation?
Which of the following would provide the strongest protection?
A system administrator has been instructed by the head of security to protect their data at-rest.
Which of the following would provide the strongest protection?
Which of the following terms describes the management of a device on the same connection as storage resources
Which of the following terms describes the management of a device on the same connection as
storage resources offered to the host?
Which of the following is a neighbor discovery protocol that sends out and receives detailed Layer 2 network i
Which of the following is a neighbor discovery protocol that sends out and receives detailed Layer
2 network information to other connected access devices and can be used by any vendor?