which of the following control types?
The IT department has setup a share point site to be used on the intranet. Security has
established the groups and permissions on the site. No one may modify the permissions and all
requests for access are centrally managed by the security team. This is an example of which of
the following control types?
which of the following documents?
After installation of an MDM solution within an organization, the organization should ensure that all
users of mobile devices agree to rules stated in which of the following documents?
CORRECT TEXT To slave the NTP daemon to an external source, an administrator needs to modify the ______ variab
CORRECT TEXT
To slave the NTP daemon to an external source, an administrator needs to modify the
______ variable in the /etc/ntp.conf file.
Which of the following is a performance optimization technology?
Which of the following is a performance optimization technology?
What is the name of the main configuration file for GRUB?
CORRECT TEXT
What is the name of the main configuration file for GRUB? (Please specify the file name with no path
information).
Which of the following describes a selection of controller-less drives?
Which of the following describes a selection of controller-less drives?
Which of the following cryptographic algorithms is MOST often used with IPSec?
Which of the following cryptographic algorithms is MOST often used with IPSec?
which of the following conditions does BIOS need to be updated?
In which of the following conditions does BIOS need to be updated?
Each correct answer represents a complete solution. Choose two.
Which of the following attack types is this?
Purchasing receives a phone call from a vendor asking for a payment over the phone. The phone
number displayed on the caller ID matches the vendor’s number. When the purchasing agent asks
to call the vendor back, they are given a different phone number with a different area code. Which
of the following attack types is this?
Which of the following should be specified within the profile for the personal devices?
The Chief Information Officer (CIO) has allowed employees to use their personal devices to
access the enterprise guest wireless network. The organization has decided to deploy network
configurations through a profile. Which of the following should be specified within the profile for the
personal devices? (Select TWO).