PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following should the security administrato…

A security administrator is performing VDI traffic data collection on a virtual server which migrates from one
host to another. While reviewing the data collected by the protocol analyzer, the security administrator notices
that sensitive data is present in the packet capture. Which of the following should the security administrator
recommend to ensure the confidentiality of sensitive information during live VM migration, while minimizing
latency issues?

Which of the following should the network administrator…

A company has added several new employees, which has caused the network traffic to increase by 200%. The
network traffic increase from the new employees was only expected to be 20% to 30%. The administration
suspects that the network may have been compromised. Which of the following should the network
administrator have done previously to minimize the possibility of a network breach?

Which of the following solutions should the technician …

A network technician is asked to redesign an Ethernet network before new monitoring software is added to
each host on the network. The new software will broadcast statistics from each host to a monitoring host for
each of the five departments in the company. The added network traffic is a concern of management that must
be addressed. Which of the following solutions should the technician design into the new network?

which of the following should the administrator do to m…

An administrator has a physical server with a single NIC. The server needs to deploy two virtual machines.
Each virtual machine needs two NIC’s, one that connects to the network, and a second that is a server to
server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of
the following should the administrator do to meet these requirements?

which of the following options is MOST accurate?

A Chief Information Security Officer (CISO) has requested that a SIEM solution be implemented. The CISO
wants to know upfront what the projected TCO would be before looking further into this concern. Two vendor
proposals have been received:
Vendor A: product-based solution which can be purchased by the pharmaceutical company.
Capital expenses to cover central log collectors, correlators, storage and management consoles expected to be
$150,000. Operational expenses are expected to be a 0.5 full time employee (FTE) to manage the solution, and
1 full time employee to respond to incidents per year.
Vendor B: managed service-based solution which can be the outsourcer for the pharmaceutical company’s
needs.
Bundled offering expected to be $100,000 per year.
Operational expenses for the pharmaceutical company to partner with the vendor are expected to be a 0.5 FTE
per year.
Internal employee costs are averaged to be $80,000 per year per FTE. Based on calculating TCO of the two
vendor proposals over a 5 year period, which of the following options is MOST accurate?


Page 322 of 4,924« First...102030...320321322323324...330340350...Last »