Which of the following would be Pete’s BEST option?
Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the
downtime in the event of a disaster, but does not have the budget approval to implement or
maintain an offsite location that ensures 99.99% availability. Which of the following would be
Pete’s BEST option?
Which of the following has Sara selected?
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher
which will encrypt 8 bits at a time before sending the data across the network. Which of the
following has Sara selected?
Which of the following has Sara selected?
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher
which will encrypt 8 bits at a time before sending the data across the network. Which of the
following has Sara selected?
what technologies should the authentication protocol be changed to?
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the
authenticator. Which of the following is configured in the RADIUS server and what technologies
should the authentication protocol be changed to?
what technologies should the authentication protocol be changed to?
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the
authenticator. Which of the following is configured in the RADIUS server and what technologies
should the authentication protocol be changed to?
which already deploys full disk encryption?
Which of the following is an advantage of implementing individual file encryption on a hard drive
which already deploys full disk encryption?
Which of the following BEST describes this arrangement?
An IT director is looking to reduce the footprint of their company’s server environment. They have
decided to move several internally developed software applications to an alternate environment,
supported by an external company. Which of the following BEST describes this arrangement?
Which of the following types of controls is being used?
A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at
the site were facing the wrong direction to capture the incident. The analyst ensures the cameras
are turned to face the proper direction. Which of the following types of controls is being used?
Which of the following protocols should be used in this scenario?
A security administrator wishes to change their wireless network so that IPSec is built into the
protocol and NAT is no longer required for address range extension. Which of the following
protocols should be used in this scenario?
Which of the following processes is being followed to ensure application integrity?
The network administrator is responsible for promoting code to applications on a DMZ web server.
Which of the following processes is being followed to ensure application integrity?
