Which of the following would describe the use of encryption in this situation?
The security administrator is tasked with authenticating users to access an encrypted database. Authentication takes place using PKI and the encryption of the database uses a separate cryptographic process to decrease latency. Which of the following would describe the use of encryption in this situation?
Which of the following would BEST help the project manager?
A project manager is new to an organization and is about to begin work on a $1,000,000 project. Which of the following would BEST help the project manager?
What are three advantages of a SAN? (Choose three.)
What are three advantages of a SAN? (Choose three.)
Which changes should be made to the plan?
A consulting firm is hired by a company in an earthquake-prone area to review their disaster plan. Review of the disaster recovery plan reveals the following:
1. Offsite backup storage is in a locked fireproof safe, with restricted key access. All tape backups are stored in this safe.
2. There is a reciprocal agreement with a sister company located two blocks from the company’s location to store each other’s backup safes. Plans are in place to allow 24-hour access to backups.
3. The selected hot site is 100 miles from the normal business site.
4. A GFS (Grandfather-Father-Son) tape rotation plan is in use.
Which changes should be made to the plan?
During troubleshooting, which action will be taken first?
A worker of your company can’t visit the shared resources located on a file server. During troubleshooting, which action will be taken first?
Which of the following tools would be used to securely administer and configure various network devices?
Which of the following tools would be used to securely administer and configure various network devices?
Which of the following applications provides an ACD service for a Cisco VoIP network?
Which of the following applications provides an ACD service for a Cisco VoIP network?
Which of the following conflict resolution techniques would be BEST to address this?
A project manager has been assigned two team members who do not get along. On past projects they have proven very difficult to work with and are often at odds with one another. Which of the following conflict resolution techniques would be BEST to address this?
Which of the following can prevent an unauthorized employee from entering a datacenter? (Select TWO).
Which of the following can prevent an unauthorized employee from entering a datacenter? (Select TWO).
Which of the following is the earned value (EV)?
The project cost performance index is 1.2 and the project manager has spent $71,248 dollars to date. The project is currently 50 percent complete. Which of the following is the earned value (EV)?