Which of the following should be connected to the fire alarm system in order to help prevent the spread of a f
Which of the following should be connected to the fire alarm system in order to help prevent
the spread of a fire in a server room without data loss to assist in an FM-200 deployment?
Which of the following can Matt implement to ensure servers will withstand hardware failure?
Matt, a security consultant, has been tasked with increasing server fault tolerance and has
been given no budget to accomplish his task. Which of the following can Matt implement to
ensure servers will withstand hardware failure?
Which of the following fire suppression systems is MOST likely used in a datacenter?
Which of the following fire suppression systems is MOST likely used in a datacenter?
Which of the following authentication protocols is the security administrator planning to implement across the
A security administrator has installed a new KDC for the corporate environment. Which of
the following authentication protocols is the security administrator planning to implement
across the organization?
which of the following attacks?
While opening an email attachment, Pete, a customer, receives an error that the application
has encountered an unexpected issue and must be shut down. This could be an example of
which of the following attacks?
Which of the following should Jane perform?
Jane has recently implemented a new network design at her organization and wishes to
passively identify security issues with the new network. Which of the following should Jane
perform?
which of the following should the security technician respond?
A security technician is working with the network firewall team to implement access controls
at the company’s demarc as part of the initiation of configuration management processes.
One of the network technicians asks the security technician to explain the access control
type found in a firewall. With which of the following should the security technician respond?
Which of the following solutions BEST relates to the host authentication protocol within the company’s e
Jane, a security administrator, has been tasked with explaining authentication services to the
company’s management team. The company runs an active directory infrastructure. Which
of the following solutions BEST relates to the host authentication protocol within the
company’s environment?
Which of the following should Pete implement to BEST achieve this goal?
Pete, the compliance manager, wants to meet regulations. Pete would like certain ports
blocked only on all computers that do credit card transactions. Which of the following should
Pete implement to BEST achieve this goal?
Which of the following devices would BEST achieve this goal?
Pete, the system administrator, wants to restrict access to advertisements, games, and
gambling web sites. Which of the following devices would BEST achieve this goal?