Which of the following is MOST likely accomplished by the program’s behavior?
A program displays:
ERROR: this program has caught an exception and will now terminate.
Which of the following is MOST likely accomplished by the program’s behavior?
which of the following?
A human resources employee receives an email from a family member stating there is a new virus
going around. In order to remove the virus, a user must delete the Boot.ini file from the system
immediately. This is an example of which of the following?
Which of the following should be implemented?
A security administrator wants to deploy a physical security control to limit an individual’s access
into a sensitive area. Which of the following should be implemented?
which of the following?
A network administrator uses an RFID card to enter the datacenter, a key to open the server rack,
and a username and password to logon to a server. These are examples of which of the
following?
which of the following authentication services?
A third party application has the ability to maintain its own user accounts or it may use single signon. To use single sign-on, the application is requesting the following information: OU=Users,
DC=Domain, DC=COM. This application is requesting which of the following authentication
services?
Which of the following results in datacenters with failed humidity controls?
Which of the following results in datacenters with failed humidity controls? (Select TWO).
Which of the following should be used to prevent data emanation?
Power and data cables from the network center travel through the building’s boiler room. Which of
the following should be used to prevent data emanation?
Which of the following database designs provides the BEST security for the online store?
An online store wants to protect user credentials and credit card information so that customers can
store their credit card information and use their card for multiple separate transactions. Which of
the following database designs provides the BEST security for the online store?
Which of the following must a security administrator implement to isolate public facing servers from both the
Which of the following must a security administrator implement to isolate public facing servers
from both the corporate network and the Internet?
Which of the following is BEST suited when assigning user rights to individuals in the sales department?
A network administrator is configuring access control for the sales department which has high
employee turnover. Which of the following is BEST suited when assigning user rights to individuals
in the sales department?