Which of the following is the reason the ABC company’s security administrator is unable to determine the ori
The security administrator at ABC company received the following log information from an external
party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is
the reason the ABC company’s security administrator is unable to determine the origin of the
attack?
Which of the following are considered part of a site coverage map?
Which of the following are considered part of a site coverage map? (Select TWO).
Which of the following is the full range of address block 192.16876.0/23?
Which of the following is the full range of address block 192.16876.0/23?
Which of the following does the administrator report?
A datacenter has 100 TB of Tier 1 storage, 600 TB of Tier 2 storage and a large tape library. HSM
is moving data from Tier 1 to Tier 2 at the rate of 5 TB per month, while 10% of Tier 2 data is
transferred to tape per year. The storage administrator is asked to forecast the amount of new Tier
2 storage that will be needed over the next two years. Which of the following does the
administrator report?
Which of the following is a fake target that deters hackers from locating your real network?
Which of the following is a fake target that deters hackers from locating your real network?
which of the following?
A user attempting to log on to a workstation for the first time is prompted for the following
information before being granted access: username, password, and a four-digit security pin that
was mailed to him during account registration. This is an example of which of the following?
which of the following?
A network system that pushes a network identity out into the public Internet is known as which of
the following?
Which of the following could be used to find the approximate location of a break in a long network cable?
Which of the following could be used to find the approximate location of a break in a long
network cable?
Which of the following is the MOST secure method to enable remote users to access a company’s internal n
Which of the following is the MOST secure method to enable remote users to access a
company’s internal network resources?
Which of the following should the administrator have checked BEFORE starting the move?
The switches in one fabric, in a redundant FC environment, were recently moved. A subset of
hosts lost all connectivity to their SAN-attached disk resources during the move. Which of the
following should the administrator have checked BEFORE starting the move?