which of the following layers of the OSI model?
The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of
the OSI model? (Select TWO).
Which of the following is the plan describing?
A security administrator is reviewing the company’s continuity plan. The plan specifies an
RTO of six hours and RPO of two days. Which of the following is the plan describing?
Which of the following are process groups in the project life cycle?
Which of the following are process groups in the project life cycle? (Select Three).
Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?
Which of the following would be used to establish a dedicated connection in a hybrid cloud
environment?
Which of the following is generating this error message?
Joe, a technician, receives an error message on his tower PC just after POST which reads:
“WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics.”
Which of the following is generating this error message?
Which of the following would be the LEAST number of devices needed to provide coverage to the entire building?
A technician is installing 802.11a wireless access points in an open warehouse 300 feet (91.44
meters) long and 200 feet (60.96 meters) wide. Which of the following would be the LEAST
number of devices needed to provide coverage to the entire building?
Which of the following wireless standards only uses TKIP encryption?
Which of the following wireless standards only uses TKIP encryption?
Which of the following is the MOST likely reason why the incident response team is unable to identify and corr
The incident response team has received the following email messagE.
From: monitor@ext-company.com
To: security@company.com
Subject: Copyright infringement
A copyright infringement alert was triggered by IP address 13.10.66.5 at 09: 50: 01 GMT.
After reviewing the following web logs for IP 13.10.66.5, the team is unable to correlate and
identify the incident.
09: 45: 33 13.10.66.5 http: //remote.site.com/login.asp?user=john
09: 50: 22 13.10.66.5 http: //remote.site.com/logout.asp?user=anne
10: 50: 01 13.10.66.5 http: //remote.site.com/access.asp?file=movie.mov
11: 02: 45 13.10.65.5 http: //remote.site.com/download.asp?movie.mov=ok
Which of the following is the MOST likely reason why the incident response team is unable
to identify and correlate the incident?
Which of the following stages of team development is the project team demonstrating?
A project team is comfortable working as a group and has accepted all the project ground rules.
They support each other to reach the project goals. Which of the following stages of team
development is the project team demonstrating?
Which of the following should the administrator implement NEXT?
An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a
data encryption technology using AES cryptography. Which of the following should the administrator
implement NEXT?