Which of the following mitigation methods would provide the MOST physical protection?
Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation
methods would provide the MOST physical protection?
Which of the following should be connected to the fire alarm system in order to help prevent the spread of a f
Which of the following should be connected to the fire alarm system in order to help prevent the
spread of a fire in a server room without data loss to assist in an FM-200 deployment?
Which of the following can Matt implement to ensure servers will withstand hardware failure?
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been
given no budget to accomplish his task. Which of the following can Matt implement to ensure
servers will withstand hardware failure?
Which of the following access controls apply to the sensitive file on the server?
Pete has obtained a highly sensitive document and has placed it on a network drive which has
been formatted with NTFS and is shared via CIFS. Which of the following access controls apply to
the sensitive file on the server?
Which of the following fire suppression systems is MOST likely used in a datacenter?
Which of the following fire suppression systems is MOST likely used in a datacenter?
Which of the following authentication protocols is the security administrator planning to implement across the
A security administrator has installed a new KDC for the corporate environment. Which of the
following authentication protocols is the security administrator planning to implement across the
organization?
Which of the following uses only a private key?
Which of the following uses only a private key?
which of the following attacks?
While opening an email attachment, Pete, a customer, receives an error that the application has
encountered an unexpected issue and must be shut down. This could be an example of which of
the following attacks?
Which of the following should Jane perform?
Jane has recently implemented a new network design at her organization and wishes to passively
identify security issues with the new network. Which of the following should Jane perform?
Which of the following would be a BEST practice to secure the servers?
A database server containing personal information and a file server containing non-critical
information must be secured. Which of the following would be a BEST practice to secure the
servers? (Select TWO).