Which of the following development methodologies is the team MOST likely using now?
A software development manager is taking over an existing software development project. The
team currently suffers from poor communication due to a long delay between requirements
documentation and feature delivery. This gap is resulting in an above average number of securityrelated bugs making it into production. Which of the following development methodologies is the
team MOST likely using now?
Based on the information provided, which of the following would be the MOST appropriate response to the CFO?
A security manager has received the following email from the Chief Financial Officer (CFO):
“While I am concerned about the security of the proprietary financial data in our ERP application,
we have had a lot of turnover in the accounting group and I am having a difficult time meeting our
monthly performance targets. As things currently stand, we do not allow employees to work from
home but this is something I am willing to allow so we can get back on track. What should we do
first to securely enable this capability for my group?”
Based on the information provided, which of the following would be the MOST appropriate
response to the CFO?
Which of the following tools can be used to locate its physical location within the wall?
A technician has verified that a recent loss of network connectivity to multiple workstations is due
to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its
physical location within the wall?
Which of the following is used to authenticate remote workers who connect from offsite?
Which of the following is used to authenticate remote workers who connect from offsite? (Select
TWO).
Which of the following network infrastructure implementations would be used to support files being transferred
Which of the following network infrastructure implementations would be used to support files being
transferred between Bluetooth-enabled smartphones?
Which of the following would be used in an IP-based video conferencing deployment?
Which of the following would be used in an IP-based video conferencing deployment? (Select
TWO).
Which of the following helps prevent routing loops?
Which of the following helps prevent routing loops?
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS l
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP
using a POTS line?
Which of the following actions could the administrator take to improve the performance of data transfers over
An administrator has a virtualization environment that includes a vSAN and iSCSI switching.
Which of the following actions could the administrator take to improve the performance of data
transfers over iSCSI switches?
which of the following?
A network topology that utilizes a central device with point-to-point connections to all other devices
is which of the following?