Which of the following factors yields cost savings in cloud computing? (Select TWO).

Which of the following factors yields cost savings in cloud computing? (Select TWO).A . Shared resourcesB . AvailabilityC . Ubiquitous accessD . Multi-tenancyE . On premisesView AnswerAnswer: A,D

October 16, 2018 No Comments READ MORE +

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?A . AntivirusB . FirewallC . Audit logsD . IDSView AnswerAnswer: C

October 15, 2018 No Comments READ MORE +

Which of the following access control methods could allow for a network user to sign onto their corporate network and their supplier’s network portal without having to enter their ID and password more than once?

Which of the following access control methods could allow for a network user to sign onto their corporate network and their supplier’s network portal without having to enter their ID and password more than once?A . Discretionary access controlB . Mandatory access controlC . Role-based access controlD . Federated access...

October 14, 2018 No Comments READ MORE +

Which of the following would be used to prove the existence of vulnerabilities on a network?

Which of the following would be used to prove the existence of vulnerabilities on a network?A . Penetration testingB . Vulnerability assessmentC . Business impact analysisD . Risk assessmentView AnswerAnswer: A

October 13, 2018 No Comments READ MORE +

Which of the following should be used to ensure access is controlled appropriately between devices?

Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized. Which of the following should be used to ensure access is controlled appropriately between devices? (Select TWO).A...

October 13, 2018 No Comments READ MORE +

Which of the following would be used to satisfy this scenario?

A system administrator wants to be able to use one server to collect all of the logs on the network. Which of the following would be used to satisfy this scenario?A . Firewall loggingB . Change management databaseC . Syslog serviceD . SNMPView AnswerAnswer: C

October 12, 2018 No Comments READ MORE +

Which of the following should the administrator implement NEXT?

An administrator deployed a DaaS cloud delivery model for a financial institution and implemented a data encryption technology using AES cryptography. Which of the following should the administrator implement NEXT?A . Access controlsB . RC5C . SSLD . ZoningView AnswerAnswer: A

October 11, 2018 No Comments READ MORE +

Which of the following tests should the administrator perform specific to the location change, to determine if user experience will be impacted?

The Chief Information Officer (CIO) of a company would like to close one of the company’s four datacenters. The CIO has asked the administrator to perform tests to determine if the servers can be migrated to a public cloud located in another region. Which of the following tests should the...

October 10, 2018 No Comments READ MORE +

Monitoring alarms should be set based on:

Monitoring alarms should be set based on:A . A high point for every performance counter in the system.B . The point of application installation.C . Acceptable application performance criteria.D . Support availability.View AnswerAnswer: C

October 7, 2018 No Comments READ MORE +

Which of the following should be verified?

An administrator has configured a cluster but one of the VMs returns an error when attempting to automatically fail-over to another host in the cluster. Which of the following should be verified?A . All VLANs have been taggedB . Datacenter bridging has been configuredC . All hosts are in the...

October 6, 2018 No Comments READ MORE +