Which of the following would the technician MOST likely…
A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the
following would the technician MOST likely configure?
which already deploys full disk encryption?
Which of the following is an advantage of implementing individual file encryption on a hard drive which already deploys full disk encryption?
Which of the following should the technician install an…
A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician
install and configure on the laptops if the threat is network based?
Which of the following explains the reason for the incr…
A database administrator would like to start encrypting database exports stored on the SAN, but the storage administrator warns that this may drastically increase
the amount of disk space used by the exports. Which of the following explains the reason for the increase in disk space usage?
Which of the following physical security controls preve…
Which of the following physical security controls prevents an attacker from gaining access to a network closet?
Which of the following types of data encryption would M…
Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific table?
Which of the following would be identified as physical …
During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at
the company. Which of the following would be identified as physical security controls? (Select THREE).
Which of the following BEST protects the credit card data?
A merchant acquirer has the need to store credit card numbers in a transactional database in a high performance environment. Which of the following BEST
protects the credit card data?
Which of the following could the technician do for vend…
A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username
and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested
the file and found the virus. Which of the following could the technician do for vendors to validate the proper security patch?
which of the following?
To protect corporate data on removable media, a security policy should mandate that all removable devices use which of the following?