Which of the following is the LARGEST benefit from the LTO-4 specification regarding AES-GCM?
Which of the following is the LARGEST benefit from the LTO-4 specification regarding AES-GCM?
Which of the following types of authentication solutions use tickets to provide access to various resources fr
Which of the following types of authentication solutions use tickets to provide access to various
resources from a central location?
Which of the following would BEST help to reduce Recovery Time Objectives (RTO) of data restoration from long-
Which of the following would BEST help to reduce Recovery Time Objectives (RTO) of data
restoration from long-term archive?
Which of the following malware types typically allows an attacker to monitor a user’s computer, is character
Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
Which of the following would offer the ability to expand while keeping their current data center operated by i
A corporation is looking to expand their data center but has run out of physical space in which to
store hardware. Which of the following would offer the ability to expand while keeping their current
data center operated by internal staff?
Which of the following should be the FIRST step to troubleshoot the problem?
A server with two HBAs is connected to two identical fabrics and configured as active-active, load
balanced with automatic failover. Under normal conditions, traffic is moving across both fabrics
equally. During a maintenance window to upgrade code on the switches, Fabric A is taken offline.
This server reports all paths lost. The switch on Fabric B shows no light on the port connected to
HBA B. Which of the following should be the FIRST step to troubleshoot the problem?
Which of the following has the attacker created?
After viewing wireless traffic, an attacker notices the following networks are being broadcasted by
local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a
malicious device. Which of the following has the attacker created?
Which of the following malware types may require user interaction, does not hide itself, and is commonly ident
Which of the following malware types may require user interaction, does not hide itself, and is
commonly identified by marketing pop-ups based on browsing habits?
Which of the following can be configured on the storage controller to accomplish this?
An administrator wants to hide storage resources from servers that should not have access to
them. Which of the following can be configured on the storage controller to accomplish this?
Which of the following concepts is enforced by certifying that email communications have been sent by who the
Which of the following concepts is enforced by certifying that email communications have been
sent by who the message says it has been sent by?