Which of the following types of controls is being used?
A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at
the site were facing the wrong direction to capture the incident. The analyst ensures the cameras
are turned to face the proper direction. Which of the following types of controls is being used?
Which of the following configurations is aimed at increasing data availability and protecting a storage system
Which of the following configurations is aimed at increasing data availability and protecting a
storage system from becoming unavailable due to a partial network outage?
Which of the following protocols should be used in this scenario?
A security administrator wishes to change their wireless network so that IPSec is built into the
protocol and NAT is no longer required for address range extension. Which of the following
protocols should be used in this scenario?
Which of the following can still result in exposure of the sensitive data in the database server?
Highly sensitive data is stored in a database and is accessed by an application on a DMZ server.
The disk drives on all servers are fully encrypted. Communication between the application server
and end-users is also encrypted. Network ACLs prevent any connections to the database server
except from the application server. Which of the following can still result in exposure of the
sensitive data in the database server?
Which of the following would the technician check FIRST to troubleshoot the problem?
A technician has a host connected to two fibre channel fabrics using two different HBAs. There are
many errors on one HBA. There are also many errors on the switch port where the error HBA is
connected. Which of the following would the technician check FIRST to troubleshoot the problem?
Which of the following processes is being followed to ensure application integrity?
The network administrator is responsible for promoting code to applications on a DMZ web server.
Which of the following processes is being followed to ensure application integrity?
which of the following?
The fundamental information security principals include confidentiality, availability and which of the
following?
Which of the following defines the difference between fibre channel switch fabric and fibre channel arbitrated
Which of the following defines the difference between fibre channel switch fabric and fibre channel
arbitrated loop technologies?
which of the following types of testing?
An IT auditor tests an application as an authenticated user. This is an example of which of the
following types of testing?
Which of the following is found on a Gigabit Ethernet network and helps increase throughput while consuming fe
Which of the following is found on a Gigabit Ethernet network and helps increase throughput while
consuming fewer CPU cycles?
