Which of the following network architecture concepts is used to securely isolate at the boundary between netwo
Which of the following network architecture concepts is used to securely isolate at the boundary
between networks?
Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
Which of the following is BEST used to break a group of IP addresses into smaller network
segments or blocks?
Which of the following MUST be prevented in order for this policy to be effective?
Datacenter access is controlled with proximity badges that record all entries and exits from the
datacenter. The access records are used to identify which staff members accessed the data
center in the event of equipment theft. Which of the following MUST be prevented in order for this
policy to be effective?
which of the following data security concerns?
Elastic cloud computing environments often reuse the same physical hardware for multiple
customers over time as virtual machines are instantiated and deleted. This has important
implications for which of the following data security concerns?
Which of the following would BEST be used to calculate the expected loss of an event, if the likelihood of an
Which of the following would BEST be used to calculate the expected loss of an event, if the
likelihood of an event occurring is known? (Select TWO).
When implementing fire suppression controls in a datacenter it is important to:
When implementing fire suppression controls in a datacenter it is important to:
Which of the following strategies would the administrator MOST likely implement?
An administrator wants to minimize the amount of time needed to perform backups during the
week. It is also acceptable to the administrator for restoration to take an extended time frame.
Which of the following strategies would the administrator MOST likely implement?
which of the following before deploying new software?
Vendors typically ship software applications with security settings disabled by default to ensure a
wide range of interoperability with other applications and devices. A security administrator should
perform which of the following before deploying new software?
Which of the following can be utilized in order to provide temporary IT support during a disaster…?
Which of the following can be utilized in order to provide temporary IT support during a disaster,
where the organization sets aside funds for contingencies, but does not necessarily have a
dedicated site to restore those services?
Which of the following is BEST utilized to identify common misconfigurations throughout the enterprise?
Which of the following is BEST utilized to identify common misconfigurations throughout the
enterprise?