PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following is the MOST likely cause of the problem and the BEST solution?

At 9:00 am each morning, all of the virtual desktops in a VDI implementation become extremely
slow and/or unresponsive. The outage lasts for around 10 minutes, after which everything runs
properly again. The administrator has traced the problem to a lab of thin clients that are all booted
at 9:00 am each morning. Which of the following is the MOST likely cause of the problem and the
BEST solution? (Select TWO).

what is occurring and the BEST immediate response?

A security administrator is shown the following log excerpt from a Unix system:
2013 Oct 10 07:14:57 web14 sshd[1632]: Failed password for root from 198.51.100.23 port 37914
ssh2
2013 Oct 10 07:14:57 web14 sshd[1635]: Failed password for root from 198.51.100.23 port 37915
ssh2
2013 Oct 10 07:14:58 web14 sshd[1638]: Failed password for root from 198.51.100.23 port 37916
ssh2
2013 Oct 10 07:15:59 web14 sshd[1640]: Failed password for root from 198.51.100.23 port 37918
ssh2
2013 Oct 10 07:16:00 web14 sshd[1641]: Failed password for root from 198.51.100.23 port 37920
ssh2
2013 Oct 10 07:16:00 web14 sshd[1642]: Successful login for root from 198.51.100.23 port 37924
ssh2
Which of the following is the MOST likely explanation of what is occurring and the BEST
immediate response? (Select TWO).

which of the following?

The security administrator is reviewing the business continuity plan which consists of virtual

infrastructures at corporate headquarters and at the backup site. The administrator is concerned
that the VLAN used to perform live migrations of virtual machines to the backup site is across the
network provider’s MPLS network. This is a concern due to which of the following?

Which of the following BEST explains why it was not detected and blocked by the DLP solution?

A large bank deployed a DLP solution to detect and block customer and credit card data from
leaving the organization via email. A disgruntled employee was able to successfully exfiltrate data
through the corporate email gateway by embedding a word processing document containing
sensitive data as an object in a CAD file. Which of the following BEST explains why it was not
detected and blocked by the DLP solution? (Select TWO).