Laurel is selecting a VPN protocol for her company’s network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?
Adrienne wants to be able to analyze the traffic coming into…
Adrienne wants to be able to analyze the traffic coming into a Linux server’s network interface. Which of the following command line utilities will allow her to see this information?
Len has identified encrypted files in the network databases…
Len has identified encrypted files in the network databases that contain sensitive information but are configured with access permissions that allow almost everyone access. What type of security issue is this?
Jennifer manages the IT department at a huge corporation. Af…
Jennifer manages the IT department at a huge corporation. After a catastrophic resource failure 8 months ago, the IT department was tasked with developing a plan to avoid such an event from happening again. Jennifer’s team decides to start this project with a brainstorming session where any idea can be suggested and the team will then discuss if the solution is logistically possible and will help avoid another catastrophic failure. Which suggestion is Jennifer’s team most likely to throw out first because it will not address the issue?
Marcus has been asked to configure a web server with a speci…
Marcus has been asked to configure a web server with a specific private class C IP address. Which of the following is a possible address she was given?
Denis is trying to determine which route’s packets are trave…
Denis is trying to determine which route’s packets are traveling over when accessing his company’s chosen cloud service provider. Which of the following Windows tools can help him discover that information?
Sebastian is trying to access a resource that has been label…
Sebastian is trying to access a resource that has been labeled as top secret, but he only has secret clearance. Which of the following access control methods does his organization use?
Fictional Corp is building a private cloud in their data cen…
Fictional Corp is building a private cloud in their data center. They want to ensure extra resources are available if a server fails. Which of the following technologies might they build their cloud upon?
Raven has been asked to configure the web server with a spec…
Raven has been asked to configure the web server with a specific public class B IP address. Which of the following is a possible address she was given?
A holiday ornament manufacturer sees traffic increase to the…
A holiday ornament manufacturer sees traffic increase to their website in a couple of months leading up to the holiday, but then it tapers off and is very low for the rest of the year. Which of the following benefits of cloud computing might they be the most interested in for this use?