Which of the following options is BEST suited to run the password auditing software and produce a report in th
A security administrator wants to perform an audit of the company password file to ensure users
are not using personal information such as addresses and birthdays as part of their password. The
company employs 200,000 users, has virtualized environments with cluster and cloud-based
computing resources, and enforces a minimum password length of 14 characters. Which of the
following options is BEST suited to run the password auditing software and produce a report in the
SHORTEST amount of time?
what should happen NEXT?
A technician is on the phone with a software vendor and needs to fix an issue. The vendor asks
specific information regarding a patient’s file. Which of the following describes what should happen
NEXT?
Which of the following should the network administrator do to resolve the performance issue after analyzing th
What does EPA stand for?
What does EPA stand for?
Which of the following must the technician perform to ensure the display is extended rather than mirrored?
A new machine is being setup and dual screens are required. Which of the following must the
technician perform to ensure the display is extended rather than mirrored?
Which of the following is the issue with this setup?
A SOHO company just installed new 802.11a wireless APs. All company laptops have gigabit LAN
ports along with wireless-g cards. Which of the following is the issue with this setup?
Which of the following should the security administrator report to upper management based on the above output?
The security administrator at ‘company.com’ is reviewing the network logs and notices a new UDP
port pattern where the amount of UDP port 123 packets has increased by 20% above the
baseline. The administrator runs a packet capturing tool from a server attached to a SPAN port
and notices the following.
UDP 192.168.0.1:123 -> 172.60.3.0:123
UDP 192.168.0.36:123 -> time.company.com
UDP 192.168.0.112:123 -> 172.60.3.0:123
UDP 192.168.0.91:123 -> time.company.com
UDP 192.168.0.211:123 -> 172.60.3.0:123
UDP 192.168.0.237:123 -> time.company.com
UDP 192.168.0.78:123 -> 172.60.3.0:123
The corporate HIPS console reports an MD5 hash mismatch on the svchost.exe file of the
following computers:
192.168.0.1
192.168.0.112
192.168.0.211
192.168.0.78
Which of the following should the security administrator report to upper management based on the
above output?
Which of the following protocols would the OS use to connect to these shares?
A Windows Server is sharing files on the network. A UNIX based OS needs to connect to the
Windows Server to access some of the shared files. Which of the following protocols would the OS
use to connect to these shares?
Which of the following is the recommendation the IT Director should present to senior staff?
A mid-level company is rewriting its security policies and has halted the rewriting progress
because the company’s executives believe that its major vendors, who have cultivated a strong
personal and professional relationship with the senior level staff, have a good handle on
compliance and regulatory standards. Therefore, the executive level managers are allowing
vendors to play a large role in writing the policy. Having experienced this type of environment in
previous positions, and being aware that vendors may not always put the company’s interests first,
the IT Director decides that while vendor support is important, it is critical that the company writes
the policy objectively. Which of the following is the recommendation the IT Director should present
to senior staff?
Which of the following is a typical SAN interface?
A medical facility needs to setup a SAN. Which of the following is a typical SAN interface?