Which of the following should appear in the primary DNS configuration file to accomplish this?
A company has a primary DNS server at address 192.168.10.53 and a secondary server at
192.168.20.53. An administrator wants to secure a company by only allowing secure zone
transfers to the secondary server. Which of the following should appear in the primary DNS
configuration file to accomplish this?
Which of the following BEST describes the difference between differential and incremental backups?
Which of the following BEST describes the difference between differential and incremental backups?
Which of the following is a common connector used on a coaxial cable?
Which of the following is a common connector used on a coaxial cable?
Which of the following security practices would allow for non-repudiation and prevent network sniffers from re
An employee of a company files a complaint with a security administrator. While sniffing network
traffic, the employee discovers that financially confidential emails were passing between two
warehouse users. The two users deny sending confidential emails to each other. Which of the
following security practices would allow for non-repudiation and prevent network sniffers from
reading the confidential mail? (Select TWO).
An environment that allows multiple operating systems to run on the same hardware independently of each other
An environment that allows multiple operating systems to run on the same hardware independently
of each other is called a/an:
which of the following cipher suites would provide strong security, but at the same time the worst performance
An administrator of a secure web server has several clients with top security clearance and prefers
security over performance. By default, which of the following cipher suites would provide strong
security, but at the same time the worst performance?
Which of the following computer ports supports hot swapping?
Which of the following computer ports supports hot swapping?
which of the following?
The standard coding for procedures provided by the Center for Disease Control, that will take effect
in 2013, is called which of the following?
which of the following locations does the responsibility of a Telco provider cease?
At which of the following locations does the responsibility of a Telco provider cease?
Which of the following are supported authentication or encryption methods to use while implementing this?
An administrator wants to integrate the Credential Security Support Provider (CredSSP) protocol
network level authentication (NLA) into the remote desktop terminal services environment. Which
of the following are supported authentication or encryption methods to use while implementing
this? (Select THREE).
