What is the use of Direct Memory Access (DMA) in a computer?
What is the use of Direct Memory Access (DMA) in a computer?
Which of the following policies will MOST likely be violated?
An administrator receives a notification from legal that an investigation is being performed on
members of the finance department. As a precaution, legal has advised a legal hold on all
documents for an unspecified period of time. Which of the following policies will MOST likely be
violated? (Select TWO).
Which of the following BEST explains SAML?
Which of the following BEST explains SAML?
Which of the following are types of Random Access Memory (RAM)?
Which of the following are types of Random Access Memory (RAM)?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following BEST balances the security risk and IT drivers for cloud computing?
The organization has an IT driver on cloud computing to improve delivery times for IT solution
provisioning. Separate to this initiative, a business case has been approved for replacing the
existing banking platform for credit card processing with a newer offering. It is the security
practitioner’s responsibility to evaluate whether the new credit card processing platform can be
hosted within a cloud environment. Which of the following BEST balances the security risk and IT
drivers for cloud computing?
Which of the following will MOST likely result in some IT resources not being integrated?
The Universal Research Association has just been acquired by the Association of Medical
Business Researchers. The new conglomerate has funds to upgrade or replace hardware as part
of the acquisition, but cannot fund labor for major software projects. Which of the following will
MOST likely result in some IT resources not being integrated?
Which type of memory chip has 168 pins?
Which type of memory chip has 168 pins?
what point in the implementation process should this problem have been discovered?
A large enterprise introduced a next generation firewall appliance into the Internet facing DMZ. All
Internet traffic passes through this appliance. Four hours after implementation the network
engineering team discovered that traffic through the DMZ now has un-acceptable latency, and is
recommending that the new firewall be taken offline. At what point in the implementation process
should this problem have been discovered?
How will you designate a hard disk drive as a Master or a Slave drive in an IDE system?
How will you designate a hard disk drive as a Master or a Slave drive in an IDE system?
Which of the following should the security administrator provide to opposing council?
A company has implemented data retention policies and storage quotas in response to their legal
department’s requests and the SAN administrator’s recommendation. The retention policy states
all email data older than 90 days should be eliminated. As there are no technical controls in place,
users have been instructed to stick to a storage quota of 500Mb of network storage and 200Mb of
email storage. After being presented with an e-discovery request from an opposing legal council,
the security administrator discovers that the user in the suit has 1Tb of files and 300Mb of email
spanning over two years. Which of the following should the security administrator provide to
opposing council?