Which of the following would BEST meet the CIO and CRO’s requirements?
The Chief Information Officer (CIO) has mandated web based Customer Relationship
Management (CRM) business functions be moved offshore to reduce cost, reduce IT overheads,
and improve availability. The Chief Risk Officer (CRO) has agreed with the CIO’s direction but has
mandated that key authentication systems be run within the organization’s network. Which of the
following would BEST meet the CIO and CRO’s requirements?
Which of the following provides the BEST application availability and is easily expanded as demand grows?
Which of the following provides the BEST application availability and is easily expanded as
demand grows?
Which of the following would provide the BEST logical separation of these three device types while still allow
An administrator connects VoIP phones to the same switch as the network PCs and printers.
Which of the following would provide the BEST logical separation of these three device types while
still allowing traffic between them via ACL?
Which of the following wireless security measures can an attacker defeat by spoofing certain properties of the
Which of the following wireless security measures can an attacker defeat by spoofing certain
properties of their network interface card?
Which of the following provides additional encryption strength by repeating the encryption process with additi
Which of the following provides additional encryption strength by repeating the encryption process
with additional keys?
Which of the following BEST describes part of the PKI process?
Which of the following BEST describes part of the PKI process?
Which of the following controls could be implemented to discover if they are working together?
Two members of the finance department have access to sensitive information. The company is
concerned they may work together to steal information. Which of the following controls could be
implemented to discover if they are working together?
Which of the following replies has the administrator received?
A system administrator attempts to ping a hostname and the response is 2001:4860:0:2001::68.
Which of the following replies has the administrator received?
Which of the following allows a network administrator to implement an access control policy based on individua
Which of the following allows a network administrator to implement an access control policy based
on individual user characteristics and NOT on job function?
Which of the following allows a network administrator to implement an access control policy based on individua
Which of the following allows a network administrator to implement an access control policy based
on individual user characteristics and NOT on job function?