Which of the following security measures is the BEST to use?
A company needs strong wireless security enabled for minimal cost. Which of the following
security measures is the BEST to use?
which of the following would be used?
When connecting two Fibre Channel switches using different domain IDs, which of the following
would be used?
Which of the following applications are extremely sensitive to latency?
Which of the following applications are extremely sensitive to latency? (Select TWO).
Which of the following would include the MOST detail on these objectives?
In the case of a major outage or business interruption, the security office has documented the
expected loss of earnings, potential fines and potential consequence to customer service. Which
of the following would include the MOST detail on these objectives?
Which of the following tools could the technician use to determine if it is the client or the server that is d
A user reports being occasionally disconnected from the server. Which of the following tools
could the technician use to determine if it is the client or the server that is dropping the
connection?
which of the following is the resulting de-duplication ratio?
Given that a particular de-duplication solution stores 1TB of data using only 140G of space, which
of the following is the resulting de-duplication ratio?
Which of the following has MOST likely occurred?
After visiting a website, a user receives an email thanking them for a purchase which they did not
request. Upon investigation the security administrator sees the following source code in a pop-up
window:
<HTML>
<body onload=”document.getElementByID(‘badForm’).submit()”>
<form id=”badForm” action=”shoppingsite.company.com/purchase.php” method=”post”
<input name=”Perform Purchase” value=”Perform Purchase” />
</form></body></HTML>
Which of the following has MOST likely occurred?
An IPS appliance that uses statistical analysis to identify network traffic anomalies is said to be:
An IPS appliance that uses statistical analysis to identify network traffic anomalies is said to
be:
Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling, one pair fo
Which of the following LAN technologies is considered fast Ethernet and uses two pairs of
cabling, one pair for sending and the other pair for receiving?
Which of the following methods would be MOST appropriate?
A server administrator has been asked to move data between two different vendor storage arrays.
The LUN from the target array has been provisioned and is slightly bigger than the LUN from the
source array. The application must remain online during the entire migration process, including
removing the source array LUNs. Which of the following methods would be MOST appropriate?