which of the following?
One of the most basic ways to protect the confidentiality of data on a laptop in the event the device
is physically stolen is to implement which of the following?
which of the following transmission media?
A SONET network typically uses which of the following transmission media?
Which of the following features describes this functionality?
A dual-controller, active/active storage array is servicing I/O for 10 mission-critical systems.
Controller A loses power and fails and all traffic is immediately routed to controller B and all
pending writes from controller A have been committed to disk without issue. Which of the following
features describes this functionality?
Which of the following features should be adjusted on all of the company# s WAPs to make this change?
A network administrator would like to ensure that the footprint of the company# s wireless
coverage is limited to the office borders, located on the premises. Which of the following
features should be adjusted on all of the company# s WAPs to make this change?
Which of the following would be used to validate programs prior to installing them?
Users report that after downloading several applications, their systems’ performance has
noticeably decreased. Which of the following would be used to validate programs prior to installing
them?
which of the following must the router perform?
In order for computers with private IP addresses to access the public Internet, which of the
following must the router perform?
Which of the following is necessary to provide load balancing on the server?
A server is attached to a dual-controller array via a single port HBA. The fabrics are fully
redundant and connected to each of the array controllers in an appropriate fashion. Which of the
following is necessary to provide load balancing on the server?
Which of the following describes how the employee is leaking these secrets?
Ann, a security analyst, has been notified that trade secrets are being leaked from one of the
executives in the corporation. When reviewing this executive’s laptop she notices several pictures
of the employee’s pets are on the hard drive and on a cloud storage network. When Ann hashes
the images on the hard drive against the hashes on the cloud network they do not match. Which of
the following describes how the employee is leaking these secrets?
Which of the following wireless router security measures provides access to a network by allowing only devices
Which of the following wireless router security measures provides access to a network by
allowing only devices on an approved physical address list?
which of the following Ethernet properties?
A link light on a switch is an example of which of the following Ethernet properties?
