Which of the following is the BEST approach for implementation of the new application on the virtual server?
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server
that is used by several employees.
Which of the following is the BEST approach for implementation of the new application on the
virtual server?
Which of the following security techniques is MOST appropriate to do this?
The information security technician wants to ensure security controls are deployed and functioning
as intended to be able to maintain an appropriate security posture. Which of the following security
techniques is MOST appropriate to do this?
Which of the following solutions provides the most flexibility when testing new security controls prior to imp
Which of the following solutions provides the most flexibility when testing new security controls
prior to implementation?
Which of the following should the administrator use to test the patching process quickly and often?
A company is about to release a very large patch to its customers. An administrator is required to
test patch installations several times prior to distributing them to customer PCs.
Which of the following should the administrator use to test the patching process quickly and often?
Which of the following describes the environment the administrator is building?
An administrator is building a development environment and requests that three virtual servers are
cloned and placed in a new virtual network isolated from the production network. Which of the
following describes the environment the administrator is building?
Which of the following techniques describes the use of application isolation during execution to prevent syste
Which of the following techniques describes the use of application isolation during execution to
prevent system compromise if the application is compromised?
Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mi
Which of the following can be used to maintain a higher level of security in a SAN by allowing
isolation of mis-configurations or faults?
Which of the following achieves this goal?
A company needs to receive data that contains personally identifiable information. The company
requires both the transmission and data at rest to be encrypted. Which of the following achieves
this goal? (Select TWO).
Which of the following does full disk encryption prevent?
Which of the following does full disk encryption prevent?
which of the following threats?
Full disk encryption is MOST effective against which of the following threats?