Which of the following settings must be configured?
A system administrator must configure the company’s authentication system to ensure that users
will be unable to reuse the last ten passwords within a six months period. Which of the following
settings must be configured? (Select Two)
Which of the following data transport?
An administrator requests a new VLAN be created to support the installation of a new SAN. Which
of the following data transport?
Which of the following access control methodologies provides an individual with the most restrictive access ri
Which of the following access control methodologies provides an individual with the most
restrictive access rights to successfully perform their authorized duties?
Which of the following should the administrator use to fulfil the requirements?
An administrator wants to provide onboard hardware based cryptographic processing and secure
key storage for full-disk encryption. Which of the following should the administrator use to fulfil the
requirements?
The administrator concludes that this traffic is a(N):
When viewing IPS logs the administrator see systems all over the world scanning the network for
servers with port 22 open. The administrator concludes that this traffic is a(N):
Which of the following risk mitigation strategies would be MOST appropriate when a user changes job roles?
Ann a user has been promoted from a sales position to sales manager. Which of the following risk
mitigation strategies would be MOST appropriate when a user changes job roles?
Which of the following rules is necessary to support this implementation?
A system administrator is implementing a firewall ACL to block specific communication to and from
a predefined list of IP addresses, while allowing all other communication. Which of the following
rules is necessary to support this implementation?
Which of the following concepts should be considered to help ensure data security?
Joe a system architect wants to implement appropriate solutions to secure the company’s
distributed database. Which of the following concepts should be considered to help ensure data
security? (Select TWO)
Which of the following should be selected?
A forensics analyst is tasked identifying identical files on a hard drive. Due to the large number of
files to be compared, the analyst must use an algorithm that is known to have the lowest collision
rate. Which of the following should be selected?
Which of the following technologies will enforce protections on these systems to prevent files and services fr
A government agency wants to ensure that the systems they use have been deployed as security
as possible. Which of the following technologies will enforce protections on these systems to
prevent files and services from operating outside of a strict rule set?