Which of the following is MOST likely to be retrieved from an individually addressable blob?
Which of the following is MOST likely to be retrieved from an individually addressable blob?A . An object IDB . A hashC . A sequence numberD . An imageView AnswerAnswer: D
Which of the following access control types allows users to assign security attributes to objects such as files and directories?
Which of the following access control types allows users to assign security attributes to objects such as files and directories?A . Role basedB . MandatoryC . DiscretionaryD . Rule set basedView AnswerAnswer: C
Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?
Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?A . CHAPB . AESC . PKID . VPNView AnswerAnswer: D
Which of the following only uses Fibre Channel to implement a storage infrastructure?
Which of the following only uses Fibre Channel to implement a storage infrastructure?A . NFSB . SANC . NASD . SMBView AnswerAnswer: B
Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards?
A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met. Which of the following is used by a third party...
Which of the following should be implemented?
A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses. Which of the following should be implemented?A . Soft limit quotasB . ReservationsC . Resource poolingD . Entitlement allocationsView AnswerAnswer: B
Which of the following provides insight information when investigating potential security breaches but does not make changes to the environment? (Select TWO).
Which of the following provides insight information when investigating potential security breaches but does not make changes to the environment? (Select TWO).A . IPSB . IDSC . Log reviewsD . FirewallsE . ACLsView AnswerAnswer: B,C
Which of the following should be used to gather this information?
A technician wants to remotely gather a list of all the software running on the client PCs throughout the organization. Which of the following should be used to gather this information?A . WMIB . SQLC . SyslogD . SNMPView AnswerAnswer: A
Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?
Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?A . ObfuscationB . AuthenticationC . Log reviewD . LUN maskingView AnswerAnswer: C
Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?
Although the SAN appears to be running without any problems, the technician is unable to reach the SAN’s web enabled management interface. Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?A . arpB . tracerouteC . pingD . ipconfigView AnswerAnswer: B