Why is capacity planning important in technology and infrastructure management
Blog
Where should a directory service server be placed to ensure…
Where should a directory service server be placed to ensure its highest level of security
Which database is used for a vCenter Server
Which database is used for a vCenter Server
You have been dispatched to resolve an issue in which all co…
You have been dispatched to resolve an issue in which all computers in the sales department lost connectivity to both the LAN and WAN. Your investigation reveals a switch located in a publically accessible hallway, was disconnected from the power outlet. Which of the following control categories would have BEST prevented this outage
A computer in the factory that controls a grinding machine,…
A computer in the factory that controls a grinding machine, is running an operating system that no longer receives security patches from the vendor. The cyber team realizes this system poses threats to the network, but unfortunately the application installed on the computer, cannot be updated and will not run on a newer version of the operating system. What is the MOST effective way to reduce this potential attack vector
Which two settings must be enabled for Enhanced Session Mode…
Which two settings must be enabled for Enhanced Session Mode to run
Why are redundant generators implemented in critical install…
Why are redundant generators implemented in critical installations
An international organization is experiencing a series of at…
An international organization is experiencing a series of attacks in which a collective of attackers are simultaneously attempting to damage the organization’s reputation. The attackers are not requesting any financial payments, but are threatening to expose exfiltrated data they claim is damaging to the organization. Which of the following BEST describes these threat actors
Wireless users experience intermittent performance issues an…
Wireless users experience intermittent performance issues and loss of access to shared data. One access point has excellent signal strength but is open. What is the likely cause
Barb has been tasked with securing an information system to…
Barb has been tasked with securing an information system to prevent unauthorized users and systems from gaining access. Which of the following properties will support the desired action