Which of the following does this example describe?

A company reduced the area utilized in its datacenter by creating virtual networking through automation and by creating provisioning routes and rules through scripting. Which of the following does this example describe?A . laCB . MSSPC . ContainersD . SaaSView AnswerAnswer: A Explanation: laaS (Infrastructure as a Service) allows the...

December 25, 2023 No Comments READ MORE +

Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?

Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?A . RTOB . MTBFC . MTTRD . RPOView AnswerAnswer: C Explanation: Mean Time To Repair (MTTR) is a maintenance metric that measures the average time required to troubleshoot and restore...

December 25, 2023 No Comments READ MORE +

Which of the following should the engineer implement?

A security engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks. Which of the following should the engineer implement?A . An air gapB . A hot siteC . A VUAND . A screened subnetView AnswerAnswer: D Explanation: A screened subnet...

December 25, 2023 No Comments READ MORE +

Which of the following should the manager use to control the network traffic?

After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?A . A DMZB . A VPN aC . A VLAND . An ACLView AnswerAnswer: D Explanation: After segmenting the network, a network...

December 24, 2023 No Comments READ MORE +

Which of the following deployment models will provide the needed flexibility with the GREATEST amount of control and security over company data and infrastructure?

A company would like to provide flexibility for employees on device preference. However, the company is concerned about supporting too many different types of hardware. Which of the following deployment models will provide the needed flexibility with the GREATEST amount of control and security over company data and infrastructure?A ....

December 24, 2023 No Comments READ MORE +

Which of the following should a technician consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?

Which of the following should a technician consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?A . The key length of the encryption algorithmB . The encryption algorithm's longevityC . A method of introducing entropy into key calculationsD . The...

December 24, 2023 No Comments READ MORE +

Which of the following is MOST capable of accomplishing both tasks?

The security team received a report of copyright infringement from the IP space of the corporate network. The report provided a precise time stamp for the incident as well as the name of the copyrighted files. The analyst has been tasked with determining the infringing source machine and instructed to...

December 24, 2023 No Comments READ MORE +

Which of the following is the BEST technical implementation to prevent this from happening again?

A major clothing company recently lost a large amount of proprietary information. The security officer must find a solution to ensure this never happens again. Which of the following is the BEST technical implementation to prevent this from happening again?A . Configure DLP solutionsB . Disable peer-to-peer sharingC . Enable...

December 23, 2023 No Comments READ MORE +

If a current private key is compromised, which of the following would ensure it cannot be used to decrypt ail historical data?

If a current private key is compromised, which of the following would ensure it cannot be used to decrypt ail historical data?A . Perfect forward secrecyB . Elliptic-curve cryptographyC . Key stretchingD . Homomorphic encryptionView AnswerAnswer: B Explanation: Perfect forward secrecy would ensure that it cannot be used to decrypt...

December 23, 2023 No Comments READ MORE +

Which of the following environment utilizes dummy data and is MOST to be installed locally on a system that allows to be assessed directly and modified easily wit each build?

Which of the following environment utilizes dummy data and is MOST to be installed locally on a system that allows to be assessed directly and modified easily wit each build?A . ProductionB . TestC . StagingD . DevelopmentView AnswerAnswer: D Explanation: The environment that utilizes dummy data and is most...

December 23, 2023 No Comments READ MORE +