Which of the following methods should a technician perf…
Which of the following methods should a technician perform to properly clear a hard drive before disposal?
Which of the following is an example of the principle o…
Which of the following is an example of the principle of least privilege and is the MOST secure when granting
access to a shared network drive used by the Accounting department?
Which of the following should be used to accomplish thi…
A system administrator is tasked with dividing the network so that each department is separate from the other.
Which of the following should be used to accomplish this task?
which of the following?
Network devices between two firewalls are included in which of the following?
Which of the following is the BEST method to prevent fu…
A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server.
Which of the following is the BEST method to prevent future occurrences?
Which of the following rule sets would accomplish this task?
A network administrator is tasked to block all outbound SSH connections on the default port from a network
subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would accomplish this task?
administrative passwords, trusted signing keys)?
Which of the following is the MOST secure method of storing critical and sensitive system information (e.g.
administrative passwords, trusted signing keys)?
Which of the following provides two-factor authentication?
Which of the following provides two-factor authentication?
which of the following represents the MINIMUM storage r…
A server administrator is researching the purchase of SSD for a server. The administrator receives a report
from the datacenter technician detailing current storage requirements and future growth planning estimates as
follows:
ServerA: Current-15TB-Future-50% growth
ServerB: Current-20TB-Future-80% growth
Based on this report, which of the following represents the MINIMUM storage requirements needed?
Which of the following should be implemented on the ser…
An administrator is developing a storage growth plan for a new file server. Which of the following should be
implemented on the server so that storage growth is restricted?