Which of the following concepts does this BEST illustrate?
A network administrator has purchased two devices that will act as failovers for each other. Which
of the following concepts does this BEST illustrate?
Which of the following would he implement to BEST address this requirement?
Matt, the network engineer, has been tasked with separating network traffic between virtual
machines on a single hypervisor. Which of the following would he implement to BEST address this
requirement? (Select TWO).
Which of the following BEST describes a demilitarized zone?
Which of the following BEST describes a demilitarized zone?
Which of the following BEST describes a demilitarized zone?
Which of the following BEST describes a demilitarized zone?
Which of the following is the BEST policy to implement?
XYZ Corporation is about to purchase another company to expand its operations. The CEO is
concerned about information leaking out, especially with the cleaning crew that comes in at night.
The CEO would like to ensure no paper files are leaked. Which of the following is the BEST policy
to implement?
Which of the following would MOST likely be used to meet this goal?
The administrator would like to implement hardware assisted full disk encryption on laptops. Which
of the following would MOST likely be used to meet this goal?
Which of the following could she perform to accomplish this task?
Jane, a security administrator, wants to harden the web server. Which of the following could she
perform to accomplish this task?
Which of the following policies could be implemented to help prevent users from displaying their login credent
Which of the following policies could be implemented to help prevent users from displaying their
login credentials in open view for everyone to see?
Which of the following BEST addresses his concerns?
Pete, the system administrator, has concerns regarding users losing their company provided
smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his
concerns?
Which of the following would BEST serve this purpose?
A security administrator wants to deploy security controls to mitigate the threat of company
employees’ personal information being captured online. Which of the following would BEST serve
this purpose?