Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?A . Scope-basedB . Role-basedC . Location-basedD . Rule-basedView AnswerAnswer: B Explanation: The access control methodology that can be described best as allowing a...
Which of the following are the MOST likely reasons?
A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)A . The server has an architecture mismatchB . The system time is not synchronizedC . The technician does not have sufficient privilegesD . The external firewall...
Which of the following represent the BEST immediate actions to prevent unauthorized server access?
A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)A . Audit all group privileges and permissionsB...
Which of the following is the BEST way to protect the data from leaking?
Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?A . Utilize...
Which of the following is the BEST course of action for the technician to take while loading the rack?
A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?A . Alternate the direction of the airflowB . Install the heaviest server at the bottom of the rackC . Place...
Which of the following would be the BEST way to complete this request?
A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this...
Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?
Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?A . RTOB . MTBFC . PROD . MTTRView AnswerAnswer: C
Which of the following actions should the technician take to complete this task as efficiently as possible?
A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible?A . Take a snapshot of the original VMB . Clone the original VMC . Convert the original VM to use dynamic disksD ....
Which of the following RAID levels should the administrator choose?
A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?A . RAID 0B . RAID 1C . RAID 5D . RAID 6View AnswerAnswer: A Explanation: The RAID level that provides the highest possible capacity for...
Modify the appropriate route entries to resolve the Internet connectivity issue.
Modify the appropriate route entries to resolve the Internet connectivity issue. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. View AnswerAnswer: