A network administrator has recently updated their network devices to ensure redundancy is in place so that:
A network administrator has recently updated their network devices to ensure redundancy is in
place so that:
which of the following concepts?
A network administrator recently updated various network devices to ensure redundancy
throughout the network. If an interface on any of the Layer 3 devices were to go down, traffic will
still pass through another interface and the production environment would be unaffected. This type
of configuration represents which of the following concepts?
Which of the following security controls would be implemented to restrict those departments?
A system administrator needs to ensure that certain departments have more restrictive controls to
their shared folders than other departments. Which of the following security controls would be
implemented to restrict those departments?
which of the following attacks?
A network analyst received a number of reports that impersonation was taking place on the
network. Session tokens were deployed to mitigate this issue and defend against which of the
following attacks?
Which of the following controls would prevent an employee from emailing unencrypted information to their perso
Which of the following controls would prevent an employee from emailing unencrypted information
to their personal email account over the corporate network?
which rates the ability of a system to correctly authenticate an authorized user?
Which of the following is a measure of biometrics performance which rates the ability of a system
to correctly authenticate an authorized user?
How many authentication factors are in use by the VPN system?
A company with a US-based sales force has requested that the VPN system be configured to
authenticate the sales team based on their username, password and a client side certificate.
Additionally, the security administrator has restricted the VPN to only allow authentication from the
US territory. How many authentication factors are in use by the VPN system?
Which of the following should the company implement to enforce software digital rights?
A software development company wants to implement a digital rights management solution to
protect its intellectual property. Which of the following should the company implement to enforce
software digital rights?
Which of the following can be inferred of a firewall that is configured ONLY with the following ACL?
Users are unable to connect to the web server at IP 192.168.0.20. Which of the following can be
inferred of a firewall that is configured ONLY with the following ACL?
PERMIT TCP ANY HOST 192.168.0.10 EQ 80
PERMIT TCP ANY HOST 192.168.0.10 EQ 443
Which of the following security awareness training is BEST suited for data owners who are concerned with prote
Which of the following security awareness training is BEST suited for data owners who are
concerned with protecting the confidentiality of their data?