One of the virtual machines on the CSP they use, which runs…

One of the virtual machines on the CSP they use, which runs a couple of the company’s apps, has had a new update implemented by George. He checked everything again, compared the outcomes to the original, authorized request, and decided the alteration was effective. What action should George take after that?

Rayshawn is about to deploy a new web server. He wants to en…

Rayshawn is about to deploy a new web server. He wants to ensure that when a user accesses the server, that their web browsing session is encrypted between the browser and the server. Which of the following should he use with the web server to provide this functionality?

Gilly is walking down the hallway at her office when she not…

Gilly is walking down the hallway at her office when she notices someone in a delivery uniform carrying boxes down the hall without an escort. She also doesn’t see a visitor’s badge, which is supposed to be clipped to a visitor’s collar. Which of the following might have just occurred?

Fictional Corp. has recently implemented a change management…

Fictional Corp. has recently implemented a change management process where a group of employees, through regular meetings, must approve or deny the changes that are proposed through a formalized process. What is the name of the team of employees that is responsible for approving or denying the requested changes?

Kim is trying to keep the containers used to support the app…

Kim is trying to keep the containers used to support the applications being used by her 80 employees from being overloaded with traffic. She decides to configure the containers to only accept a maximum of 60 requests for work at any one time. What term describes the strategy she is using?

Jordan’s manager knows that he is working on implementing a…

Jordan’s manager knows that he is working on implementing a VPN connection between the company’s on-premises data center and the cloud service provider his company uses. The manager was concerned that Jordan used an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following protocols was manager was concerned about?

Bonnie has been charged with doing an investigation of the f…

Bonnie has been charged with doing an investigation of the firewall infrastructure at her workplace. The company employs a lot of employees who work remotely from their homes in addition to having several office sites spread out around the United States. She discovers that a large number of the current firewalls are no longer maintained by the manufacturer and has persuaded the corporation to set aside some funds to acquire a replacement. Which of the following options may she suggest in their place?