Which of the following would be the BEST next step?
After a server reboot, the server no longer can connect to the iSCSI network. The switch port
shows no connection and moving the cable to a new port did not produce a positive result. Which
of the following would be the BEST next step?
Which of the following application attacks is used to gain access to SEH?
Which of the following application attacks is used to gain access to SEH?
Which of the following can the system administrator implement to separate iSCSI from other network traffic?
Some users are reporting performance issues with a newly deployed web server. While running a
protocol analyzer, the system administrator is able to capture both iSCSI and TCP port 80 traffic
on the same subnet. Which of the following can the system administrator implement to separate
iSCSI from other network traffic?
Which of the following services should be disabled to ensure secure communications?
A new web server has been provisioned at a third party hosting provider for processing credit card
transactions. The security administrator runs the netstat command on the server and notices that
ports 80, 443, and 3389 are in a ‘listening’ state. No other ports are open. Which of the following
services should be disabled to ensure secure communications?
Which of the following is an authentication service that uses UDP as a transport medium?
Which of the following is an authentication service that uses UDP as a transport medium?
Which of the following must the administrator do NEXT to enable connectivity between the host and storage arra
A new host has been added to the SAN and new LUNS have been created for the host’s use. The
administrator has created an alias for the host WWPN and placed that alias in to a zone. Which of
the following must the administrator do NEXT to enable connectivity between the host and storage
array?
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device i
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if
the device is stolen? (Select TWO).
Which of the following should the security administrator implement to mitigate password cracking attacks?
Several employee accounts appear to have been cracked by an attacker. Which of the following
should the security administrator implement to mitigate password cracking attacks? (Select TWO).
Which of the following is the main difference between NAS and DAS?
Which of the following is the main difference between NAS and DAS?
Which of the following is being implemented by Jane’s company?
Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses
to gather data on new malware. Which of the following is being implemented by Jane’s company?