Laurel is selecting a VPN protocol for her company’s network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?
Len has identified encrypted files in the network databases…
Len has identified encrypted files in the network databases that contain sensitive information but are configured with access permissions that allow almost everyone access. What type of security issue is this?
Adrienne wants to be able to analyze the traffic coming into…
Adrienne wants to be able to analyze the traffic coming into a Linux server’s network interface. Which of the following command line utilities will allow her to see this information?
Jennifer manages the IT department at a huge corporation. Af…
Jennifer manages the IT department at a huge corporation. After a catastrophic resource failure 8 months ago, the IT department was tasked with developing a plan to avoid such an event from happening again. Jennifer’s team decides to start this project with a brainstorming session where any idea can be suggested and the team will then discuss if the solution is logistically possible and will help avoid another catastrophic failure. Which suggestion is Jennifer’s team most likely to throw out first because it will not address the issue?
Marcus has been asked to configure a web server with a speci…
Marcus has been asked to configure a web server with a specific private class C IP address. Which of the following is a possible address she was given?
Denis is trying to determine which route’s packets are trave…
Denis is trying to determine which route’s packets are traveling over when accessing his company’s chosen cloud service provider. Which of the following Windows tools can help him discover that information?
Fictional Corp is building a private cloud in their data cen…
Fictional Corp is building a private cloud in their data center. They want to ensure extra resources are available if a server fails. Which of the following technologies might they build their cloud upon?
Sebastian is trying to access a resource that has been label…
Sebastian is trying to access a resource that has been labeled as top secret, but he only has secret clearance. Which of the following access control methods does his organization use?
Raven has been asked to configure the web server with a spec…
Raven has been asked to configure the web server with a specific public class B IP address. Which of the following is a possible address she was given?
One of the sales managers has requested improvements to one…
One of the sales managers has requested improvements to one of the online programs his team uses from the development team. The development team manager told him that although he had made several excellent proposals, they couldn’t be implemented without following the prescribed procedure. What should the development manager request from the sales manager?