Which of the following solutions will be the best for the organization?
An organization is seeking to implement a hot site and wants to maintain a live database server at
the backup site. Which of the following solutions will be the best for the organization?
What type of attack has just occurred?
A helpdesk technician received a phone call from an administrator at a remote branch office. The
administrator claimed to have forgotten the password for the root account on UNIX servers and
asked for it. Although the technician didn’t know any administrator at the branch office, the guy
sounded really friendly and since he knew the root password himself, he supplied the caller with the
password. What type of attack has just occurred?
Which of the following utilities will you use to diagnose the problem?
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem.
Which of the following utilities will you use to diagnose the problem?
Which of the following components reduces the size of data transmitted over congested network connections and
The IPSec protocol is configured in an organization’s network in order to maintain a complete
infrastructure for secured network communications. IPSec uses four components for this. Which of
the following components reduces the size of data transmitted over congested network connections
and increases the speed of such networks without losing data?
Which of the following methods will you use to accomplish these tasks?
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following
tasks:
Develop a risk-driven enterprise information security architecture. Deliver security infrastructure
solutions that support critical business initiatives. Which of the following methods will you use to
accomplish these tasks?
Which of the following conditions could cause a network failure?
A network is configured on a Bus topology. Which of the following conditions could cause a network
failure? Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monit
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard
or monitor of an employee’s computer?
Which of the following is an input device that is used for controlling machines…?
Which of the following is an input device that is used for controlling machines such as cranes, trucks,
underwater unmanned vehicles,
wheelchairs, surveillance cameras, and zero turning radius lawn mowers?
Which of the following statements are true about digital signatures?
A digital signature is a type of public key cryptography. Which of the following statements are true
about digital signatures? Each correct answer represents a complete solution. Choose all that apply.
what will be your answer for her question?
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited
personnel in the field of security management. She is giving a tutorial on DRP. She explains that the
major goal of a disaster recovery plan is to provide an organized way to make decisions if a
disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the
newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct
answer represents a part of the solution. Choose three.