which of the following are the MOST common techniques that attackers use to socially engineer people?
In addition to bribery and forgery, which of the following are the MOST common techniques that
attackers use to socially engineer people? (Select TWO)
Which of the following describes a setting for an Intel processor that can greatly increase the battery life o
Which of the following describes a setting for an Intel processor that can greatly increase the
battery life of a laptop?
Which RAID standard is the MOST suitable and how many disks are required?
A new 72 GB array of new storage needs to be created on a customer Web server’s existing two
SCSI drives. The current disks are 18 GB each. The new disks should remain the same size.
Which RAID standard is the MOST suitable and how many disks are required?
Which command would replace "bob" with "Bob" in all instances and generate a new letter fo
You have created a really long letter and after you are done you notice that you used the name
“Bob” many times but you forgot to capitalize it in many instances. Which command would replace
“bob” with “Bob” in all instances and generate a new letter for printing?
What is likely to occur?
You have an existing disk subsystem with 16 drives that provides volumes for six Windows hosts
on 2Gb/s links. You decide to add another 16 drive tray to double the number of raw hard drives in
order to support five (5) new UNIX servers. The average server throughput is 20 MB/s. The disk
subsystem is dual ported and configured active-passive. What is likely to occur?
Which method could identify when unauthorized access has occurred?
Which method could identify when unauthorized access has occurred?
What is table routing?
A customer has a SAS-based storage environment with a SAS domain and some standalone
servers, each with multiple built-in SAS disks. The implementation includes direct routing, table
routing and subtractive routing. What is table routing?
Which of the following should be the NEXT step for the project manager?
There are three teams assigned to the same project. Two of the project teams are ahead of
schedule; however, the product does not meet the needed quality standards. The third project
team is behind schedule, but their product meets the quality standards. Which of the following
should be the NEXT step for the project manager?
Which of the following describes a qualitative risk analysis tool that assigns ratings to project risk factors
Which of the following describes a qualitative risk analysis tool that assigns ratings to project risk
factors based upon the likelihood of occurrence and the affect it will have on the project?
Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of
Which of the following is seen as non-secure based on its ability to only store seven uppercase
characters of data making it susceptible to brute force attacks?