CORRECT TEXT

CORRECT TEXT Identify the minimum number of drives required to setup RAID level 5. A . Multiple B. 3 C. 4 D. 2View AnswerAnswer: B

May 23, 2023 No Comments READ MORE +

Which of the following script execution policy setting this?

Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the script execution policy. He wants to allow the execution of the scripts that are signed by a trusted publisher. Which of the following script execution policy setting this?A . AllSigned B. Restricted C. RemoteSigned...

May 23, 2023 No Comments READ MORE +

What fundamental attribute of network defense is she enforcing?

Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any other communication, she mandates authentication before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?A . Integrity B....

May 23, 2023 No Comments READ MORE +

To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?

To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?A . Prudent policy B. Paranoid policy C. Promiscuous policy D. Permissive policyView AnswerAnswer: A

May 23, 2023 No Comments READ MORE +

In MacOS, how can the user implement disk encryption?

In MacOS, how can the user implement disk encryption?A . By enabling BitLocker feature B. By executing dm-crypt command C. By turning on Device Encryption feature D. By enabling FileVault featureView AnswerAnswer: D

May 22, 2023 No Comments READ MORE +

Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?A . Pipe Model B. AAA model C. Hub-and-Spoke VPN model D. Hose modeView AnswerAnswer: A

May 22, 2023 No Comments READ MORE +

Identify the type of event that is recorded when an application driver loads successfully in Windows.

Identify the type of event that is recorded when an application driver loads successfully in Windows.A . Success Audit B. Error C. Warning D. InformationView AnswerAnswer: D

May 21, 2023 No Comments READ MORE +

What is the best option to do this job?

An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?A . Install a CCTV with cameras pointing to the entrance doors...

May 21, 2023 No Comments READ MORE +

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.A . Two-factor Authentication B. Smart Card Authentication C. Single-sign-on D. BiometricView AnswerAnswer: C

May 21, 2023 No Comments READ MORE +

Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?A . Automated Field Correlation B. Field-Based Approach C. Rule-Based Approach D. Graph-Based ApproachView AnswerAnswer: A

May 21, 2023 No Comments READ MORE +