Which of the following technologies was developed to allow companies…?
Which of the following technologies was developed to allow companies to use less-expensive storage
while still maintaining the speed and redundancy required in a business environment?
Which of the following ports should be used?
An employee needs to connect to a server using a secure protocol on the default port. Which of the
following ports should be used?
Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
Which of the following would needs to be created for each user?
A new security policy being implemented requires all email within the organization be digitally signed by
the author using PGP. Which of the following would needs to be created for each user?
Which of the following authentication provides users XML for authorization and authentication?
Which of the following authentication provides users XML for authorization and authentication?
Which of the following would be the BEST control to implement?
A company wants to prevent end users from plugging unapproved smartphones into PCs and transferring
data. Which of the following would be the BEST control to implement?
Which of the following authentication technique is MOST appropriate?
The ore-sales engineering team needs to quickly provide accurate and up-to-date information to
potential clients. This information includes design specifications and engineering data that is developed
and stored using numerous applications across the enterprise. Which of the following authentication
technique is MOST appropriate?
Which of the following protocols should be used for key exchange?
A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner.
Which of the following protocols should be used for key exchange?
Which of the following types of cloud computing would be MOST appropriate if an organization required complete
Which of the following types of cloud computing would be MOST appropriate if an organization required
complete control of the environment?
Which of the following metrics is MOST important is this instance?
The database server used by the payroll system crashed at 3 PM and payroll is due at 5 PM. Which of the
following metrics is MOST important is this instance?