Which of the following administration tools would be the BEST choice for scripting commands?
Which of the following administration tools would be the BEST choice for scripting commands?
Which of the following is the BEST recovery strategy?
A user has forgotten their account password. Which of the following is the BEST recovery
strategy?
Which of the following is the ALE that Sara should report to management for a security breach?
Sara, a security analyst, is trying to prove to management what costs they could incur if their
customer database was breached. This database contains 250 records with PII. Studies show that
the cost per record for a breach is $300. The likelihood that their database would be breached in
the next year is only 5%. Which of the following is the ALE that Sara should report to management
for a security breach?
Which of the following explains why a backup tape drive might be "shoe-shining" during a backup?
Which of the following explains why a backup tape drive might be “shoe-shining” during a backup?
Methods to test the responses of software and web applications to unusual or unexpected inputs is known as:
Methods to test the responses of software and web applications to unusual or unexpected inputs
is known as:
which of the following?
Allowing unauthorized removable devices to connect to computers increases the risk of which of
the following?
which of the following ways should the power supplies be attached to the rack power busses?
Two Fibre Channel directors are being installed in a rack. The rack has two power buses, each
attached to a separate Power Distribution Unit (PDU). The directors have dual power supplies to
supply N+1 power to the directors. In which of the following ways should the power supplies be
attached to the rack power busses?
Which of the following ports should be opened on the firewall?
Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the
following ports should be opened on the firewall?
Which of the following BEST describes this system type?
A computer is put into a restricted VLAN until the computer’s virus definitions are up-to-date.
Which of the following BEST describes this system type?
Which of the following describes this setup?
When connecting multiple NICs from a server to a switch and eventually to an iSCSI target, each
NIC receives its own IP address, and an iSCSI Initiator-Target link is established for each NIC.
The OS uses a round-robin technique to write data to presented LUNs. Which of the following
describes this setup?