Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
Which of the following is BEST used to break a group of IP addresses into smaller network
segments or blocks?
Which of the following terms refers to an anti-virus software file that is updated from time to time to protec
Which of the following terms refers to an anti-virus software file that is updated from time to time
to protect a computer from new viruses?
Which of the following MUST be prevented in order for this policy to be effective?
Datacenter access is controlled with proximity badges that record all entries and exits from the
datacenter. The access records are used to identify which staff members accessed the data
center in the event of equipment theft. Which of the following MUST be prevented in order for this
policy to be effective?
Which of the following steps should be taken before escalating the issue?
An employee reports a network connectivity issue to the helpdesk. Which of the following steps
should be taken before escalating the issue?
Which of the following network protocols is required to allow two computers to communicate within the same net
Which of the following network protocols is required to allow two computers to communicate
within the same network segment?
which of the following?
The legacy program for sending files to the printer queues from the command line is which of
the following?
Which of the following can be an STP cable?
Which of the following can be an STP cable?
An administrator is adding replacement drives in a critical network operation center with a very low humidity
An administrator is adding replacement drives in a critical network operation center with a very low
humidity reading of the following should the administrator do as a precaution? (Select TWO).
Which encryption standard should you choose?
You are implementing wireless access at a defense contractor. Specifications say, you must
implement the AES Encryption algorithm. Which encryption standard should you choose?
which of the following data security concerns?
Elastic cloud computing environments often reuse the same physical hardware for multiple
customers over time as virtual machines are instantiated and deleted. This has important
implications for which of the following data security concerns?