Which of the following passwords is the LEAST complex?
Which of the following passwords is the LEAST complex?
Which of the following configurations will meet the requirements?
A company hired Joe, an accountant. The IT administrator will need to create a new account for
Joe. The company uses groups for ease of management and administration of user accounts. Joe
will need network access to all directories, folders and files within the accounting department.
Which of the following configurations will meet the requirements?
Which of the following technologies enables storage blocks to be reused following data deletion?
Which of the following technologies enables storage blocks to be reused following data deletion?
Which ports and protocols are MOST likely to be open on the firewall?
During a penetration test from the Internet, Jane, the system administrator, was able to establish a
connection to an internal router, but not successfully log in to it. Which ports and protocols are
MOST likely to be open on the firewall? (Select FOUR).
Which of the following data replication technologies has the GREATEST impact on an application’s I/O per
Which of the following data replication technologies has the GREATEST impact on an
application’s I/O performance to the source data?
Which of the following is MOST likely occurring?
Ann, the network administrator, has learned from the helpdesk that employees are accessing the
wireless network without entering their domain credentials upon connection. Once the connection
is made, they cannot reach any internal resources, while wired network connections operate
smoothly. Which of the following is MOST likely occurring?
Which of the following is an application security coding problem?
Which of the following is an application security coding problem?
Which of the following must be done before powering down a storage array?
Which of the following must be done before powering down a storage array?
Which of the following will BEST meet this requirement?
An IT security technician needs to establish host based security for company workstations. Which
of the following will BEST meet this requirement?
Which of the following controls can she implement to address this concern?
Ann works at a small company and she is concerned that there is no oversight in the finance
department; specifically, that Joe writes, signs and distributes paychecks, as well as other
expenditures. Which of the following controls can she implement to address this concern?