which of the following?
It has been determined by network operations that there is a severe bottleneck on the company’s mesh topology network. The field technician has chosen to use log
management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following?
Which of the following would be MOST effective for prev…
The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity.
Which of the following would be MOST effective for preventing this behavior?
Which of the following should the technician implement …
A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an
accurate comparison?
Which of the following is the MOST likely reason the ho…
Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house living room. Joe posts the picture on a popular
social media site together with the message: “Heading to our two weeks vacation to Italy.” Upon returning home, Joe discovers that the house was burglarized.
Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe’s home address?
Which of the following systems should be used?
After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be
used?
Which of the following types of authentication is being…
A company has purchased an application that integrates into their enterprise user directory for account authentication. Users are still prompted to type in their
usernames and passwords. Which of the following types of authentication is being utilized here?
Which of the following should be implemented to ensure …
Company policies require that all network infrastructure devices send system level information to a centralized server. Which of the following should be implemented
to ensure the network administrator can review device error information from one central location?
Which of the following mitigation techniques would addr…
Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives.
Which of the following mitigation techniques would address this concern? (Select TWO).
Which of the following technologies will be used to enc…
A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames?
which of the following?
The marketing department wants to distribute pens with embedded USB drives to clients. In the past this client has been victimized by social engineering attacks
which led to a loss of sensitive data. The security administrator advises the marketing department not to distribute the USB pens due to which of the following?