Which of the following is primarily used to provide fault tolerance at the application level?
Which of the following is primarily used to provide fault tolerance at the application level? (Select
TWO)
Which of the following cipher suites should the administrator select to accomplish this goal?
A security administrator would like the corporate webserver to select perfect forward secrecy
ciphers first. Which of the following cipher suites should the administrator select to accomplish this
goal?
Which of the following is missing?
An administrator is having difficulty configuring WPA2 Enterprise using EAP-PEAP-MSCHAPv2.
The administrator has configured the wireless access points properly, and has configured policies
on the RADIUS server and configured settings on the client computers. Which of the following is
missing?
Which of the following is the MOST likely cause of this dispute?
A business has recently adopted a policy allowing employees to use personal cell phones and
tablets to access company email accounts while out of the office. Joe an employee was using a
personal cell phone for email access and was recently terminated. It is suspected that Joe saved
confidential client emails on his personal cell phone. Joe claims that the data on the phone is
completely personal and refuse to allow the company access to inspect the cell phone. Which of
the following is the MOST likely cause of this dispute?
Which of the following would BEST prevent these issues from reoccurring?
Mobile tablets are used by employees on the sales floor to access customer data. Ann a customer
recently reported that another customer was able to access her personal information on the tablet
after the employee left the area. Which of the following would BEST prevent these issues from
reoccurring?
Which of the following metrics is important for measuring the extent of data required during backup and recove
Which of the following metrics is important for measuring the extent of data required during backup
and recovery?
Which of the following can be used to ensure that sensitive records stored on a backend server can only be acc
Which of the following can be used to ensure that sensitive records stored on a backend server
can only be accessed by a front end server with the appropriate record key?
Which of the following would be used to allow a subset of traffic from a wireless network to an internal netwo
Which of the following would be used to allow a subset of traffic from a wireless network to an
internal network?
Which of the following Best describes this type of attack?
A company has identified a watering hole attack. Which of the following Best describes this type of
attack?
Which of the following is the MOST important the security manager must rely upon to help make this determinati
A security manager is discussing change in the security posture of the network, if a proposed
application is approved for deployment. Which of the following is the MOST important the security
manager must rely upon to help make this determination?