Which of the following would BEST ensure the availability of the employee database should happen to the server
During an office move a sever containing the employee information database will be shut down and
transported to a new location. Which of the following would BEST ensure the availability of the employee
database should happen to the server during the move?
Which of the following is primarily used to provide fault tolerance at the application level?
Which of the following is primarily used to provide fault tolerance at the application level? (Select TWO)
Which of the following cipher suites should the administrator select to accomplish this goal?
A security administrator would like the corporate webserver to select perfect forward secrecy ciphers
first. Which of the following cipher suites should the administrator select to accomplish this goal?
Which of the following is missing?
An administrator is having difficulty configuring WPA2 Enterprise using EAP-PEAP-MSCHAPv2. The
administrator has configured the wireless access points properly, and has configured policies on the
RADIUS server and configured settings on the client computers. Which of the following is missing?
Which of the following is the MOST likely cause of this dispute?
A business has recently adopted a policy allowing employees to use personal cell phones and tablets to
access company email accounts while out of the office. Joe an employee was using a personal cell phone
for email access and was recently terminated. It is suspected that Joe saved confidential client emails on
his personal cell phone. Joe claims that the data on the phone is completely personal and refuse to allow
the company access to inspect the cell phone. Which of the following is the MOST likely cause of this
dispute?
Which of the following would BEST prevent these issues from reoccurring?
Mobile tablets are used by employees on the sales floor to access customer data. Ann a customer
recently reported that another customer was able to access her personal information on the tablet after
the employee left the area. Which of the following would BEST prevent these issues from reoccurring?
Which of the following metrics is important for measuring the extent of data required during backup and recove
Which of the following metrics is important for measuring the extent of data required during backup and
recovery?
Which of the following can be used to ensure that sensitive records stored on a backend server can only be acc
Which of the following can be used to ensure that sensitive records stored on a backend server can only
be accessed by a front end server with the appropriate record key?
Which of the following would be used to allow a subset of traffic from a wireless network to an internal netwo
Which of the following would be used to allow a subset of traffic from a wireless network to an internal
network?
Which of the following Best describes this type of attack?
A company has identified a watering hole attack. Which of the following Best describes this type of
attack?