Layer 7 devices used to prevent specific types of html tags are called:
Layer 7 devices used to prevent specific types of html tags are called:
Which of the following technologies supports the ability to swap hardware without downtime?
An Internet service provider must support highly available storage arrays. Which of the following
technologies supports the ability to swap hardware without downtime?
Which of the following will allow for faster imaging to a second hard drive?
A security administrator needs to image a large hard drive for forensic analysis. Which of the
following will allow for faster imaging to a second hard drive?
Which of the following would be configured to provide these reports?
A network administrator needs to provide daily network usage reports on all layer 3 devices
without compromising any data while gathering the information. Which of the following would be
configured to provide these reports?
Which of the following terms describes multiple devices connected to the same switch port within a SAN?
Which of the following terms describes multiple devices connected to the same switch port within a
SAN?
which of the following risk mitigation strategies?
A security administrator has been tasked to ensure access to all network equipment is controlled
by a central server such as TACACS+. This type of implementation supports which of the following
risk mitigation strategies?
Which of the following would BEST prevent this from occurring again?
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security
gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the
tethered connection and corporate data is stolen. Which of the following would BEST prevent this
from occurring again?
Which of the following is true?
A customer has a SQL server with data and log files stored on the SAN. Data is replicated to an
offsite SAN every night for the database and every hour for the log files. In the event of a failure,
the SQL server can be brought up at the offsite location within 5 hours. Which of the following is
true?
which of the following should be used to decrypt data at company B?
Company A sends a PGP encrypted file to company B. If company A used company B’s public key
to encrypt the file, which of the following should be used to decrypt data at company B?
Which of the following can be implemented if a security administrator wants only certain devices connecting to
Which of the following can be implemented if a security administrator wants only certain devices
connecting to the wireless network?