Which of the following would provide the BEST environment for performing this testing?
Joe, a technician, is tasked with finding a way to test operating system patches for a wide variety
of servers before deployment to the production environment while utilizing a limited amount of
hardware resources. Which of the following would provide the BEST environment for performing
this testing?
which of the following?
Establishing a method to erase or clear cluster tips is an example of securing which of the
following?
Which of the following should the administrator utilize to test for unidentified faults or memory leaks?
An application developer has tested some of the known exploits within a new application. Which of
the following should the administrator utilize to test for unidentified faults or memory leaks?
Which of the following controls should critical application servers implement to protect themselves from other
Which of the following controls should critical application servers implement to protect themselves
from other potentially compromised application services?
Which of the following would be MOST appropriate if an organization’s requirements mandate complete cont
Which of the following would be MOST appropriate if an organization’s requirements mandate
complete control over the data and applications stored in the cloud?
Which of the following could BEST eliminate this issue?
It has been discovered that students are using kiosk tablets intended for registration and
scheduling to play games and utilize instant messaging. Which of the following could BEST
eliminate this issue?
which of the following?
Verifying the integrity of data submitted to a computer program at or during run-time, with the
intent of preventing the malicious exploitation of unintentional effects in the structure of the code,
is BEST described as which of the following?
SQL databases in a three-tier environment?
Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier
environment?
Match each RAID type with the correct configuration and MINIMUM number of drives.
DRAG DROP
A security administrator is given the security and availability profiles for servers that are being
deployed.
Match each RAID type with the correct configuration and MINIMUM number of drives.
Review the server profiles and match them with the appropriate RAID type based on integrity,
availability, I/O, storage requirements. Instructions:
All drive definitions can be dragged as many times as necessary
Not all placeholders may be filled in the RAID configuration boxes
If parity is required, please select the appropriate number of parity checkboxes
Server profiles may be dragged only once
Instructions: If at any time you would like to bring back the initial state of the simulation, please
select the Reset button. When you have completed the simulation, please select the Done button
to submit. Once the simulation is submitted, please select the Next button to continue.
Which of the following is an authentication method Jane should use?
Jane, a security administrator, needs to implement a secure wireless authentication method that
uses a remote RADIUS server for authentication.
Which of the following is an authentication method Jane should use?