Which of the following detection controls can be used to identify an unauthorized individual who accessed a re
Which of the following detection controls can be used to identify an unauthorized individual who
accessed a remote network share?
Which of the following should the technician do?
The performance logs on a virtualization server show a large number of pages being written to
disk at a high rate. Which of the following should the technician do?
Which of the following allows a network device to process storage traffic without significant delays, even if
Which of the following allows a network device to process storage traffic without significant delays,
even if the amount of other network traffic has saturated the link?
Which of the following can be done to review if the appropriate management security controls are in place at t
A company wants to migrate its critical application to a public cloud but the security administrator
is concerned with the application’s data confidentiality requirements. Which of the following can be
done to review if the appropriate management security controls are in place at the provider?
Which of the following should the company revise?
A catastrophic disk failure occurred on a company’s critical database. After a technician performs
a full system restore, one of the business units realizes that the current backup does not hold fresh
enough information. Which of the following should the company revise?
which of the following?
A company has virtualized all of their servers on one physical server located on the company’s
first floor datacenter. The company also uses security software from a third-party cloud vendor as
part of a SaaS contract. The overall cloud network model for this company’s network is BEST
described by which of the following?
Which of the following migration methods would accomplish this?
A company has five servers and wishes to consolidate into a single physical server. Which of the
following migration methods would accomplish this?
An external USB hard drive physically attached to a server is a:
An external USB hard drive physically attached to a server is a:
Which of the following protocols is MOST likely used by a switch to communicate status information to an admin
Which of the following protocols is MOST likely used by a switch to communicate status
information to an administrator?
Which of the following should be implemented?
A company has multiple guest operating systems running in a virtual environment. An
administrator would like to ensure all servers consistently receive the same IP addresses. Which
of the following should be implemented?