Which of the following set of terms are correctly applied to an archiving solution versus backup solution?
Which of the following set of terms are correctly applied to an archiving solution versus backup
solution?
Which of the following technologies can store multi-tenant data with different security requirements?
Which of the following technologies can store multi-tenant data with different security
requirements?
Which of the following actions should the administrator take FIRST?
A SAN administrator is troubleshooting a synchronized data mirroring issue between the primary
and DR datacenters. The datacenters use routed FCIP traffic over a WAN for the mirror traffic.
The mirror relationships are breaking at an increasing frequency. Which of the following actions
should the administrator take FIRST?
Which of the following malware types is MOST likely to execute its payload after Jane, an employee, has left t
Which of the following malware types is MOST likely to execute its payload after Jane, an
employee, has left the company?
how should Matt meet this requirement?
Matt, a security analyst, needs to implement encryption for company data and also prevent theft of
company data. Where and how should Matt meet this requirement?
Which of the following network technologies should an administrator use to replicate data between datacenters
Which of the following network technologies should an administrator use to replicate data between
datacenters across the Pacific ocean?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following types of encryption will help in protecting files on a PED?
Which of the following application security principles involves inputting random data into a program?
Which of the following application security principles involves inputting random data into a
program?
Which of the following should be checked FIRST?
After working for the past six months, a server no longer can see its storage. A switch port where
the server is connecting indicates that there is no connection. An administrator moves the cable to
the next switch port but it also shows no connection. Which of the following should be checked
FIRST?
Which of the following does full disk encryption prevent?
Which of the following does full disk encryption prevent?