Which of the following should the company also perform as a data loss prevention method?
A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy . Which of the following should the company also perform as a data loss prevention method?A . Encrypt all network traffic B. Implement MFA on all the...
Which of the following subnet masks would be appropriate for this setup?
A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254 . Which of the following subnet masks would be appropriate for this setup?A . 255.255.255.0 B. 255.255.255.128 C. 255.255.255.240 D. 255.255.255.254View...
Which of the following should the administrator do to prevent this situation in the future?
Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off . Which of the following should the administrator do to prevent this situation in the future?A . Connect the server to a KVM B. Use cable...
Which of the following backup methods does this describe?
A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used . Which of the following backup methods does this describe?A . Open file B. Synthetic full C. Full Incremental D. Full differentialView AnswerAnswer: A
Which of the following tools will analyze network logs in real time to report on suspicious log events?
Which of the following tools will analyze network logs in real time to report on suspicious log events?A . Syslog B. DLP C. SIEM D. HIPSView AnswerAnswer: C Explanation: Reference: https://www.manageengine.com/products/eventlog/syslog-server.html
Which of the following is the MOST likely reason for the connection failure?
A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is sucessful. To...
Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries . Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same...
Which of the following backup methods does this describe?
A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used . Which of the following backup methods does this describe?A . Open file B. Synthetic full C. Full Incremental D. Full differentialView AnswerAnswer: A
Which of the following is the BEST method to power on the server remotely?
A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off . Which of the following is the BEST method to power on the server...
Which of the following IP addresses should the administrator use to be in compliance with the standard?
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard . Which of the following IP addresses should the administrator use to be in compliance with the standard?A . 11.251.196.241 B. 171.245.198.241 C. 172.16.19.241 D. 193.168.145.241View AnswerAnswer: C...