1.
Which of the following provides an organization with the ability to hide an internal private network, while simultaneously providing additional IP addresses?
2.
Which of the following signature-based monitoring systems is used to detect and remove known worms and Trojans on a host?
3.
Which of the following allows management to track whether staff members have accessed an authorized area?
4.
To follow industry best practices for disaster recovery planning, an alternate site should be geographically:
5.
Which of the following environmental controls would require a thermostat within the datacenter?
6.
If a user lost their private key, which of the following actions would an administrator need to take?
7.
A library provides an administrator with criteria and keywords to prevent children from accessing certain websites. Which of the following would BEST accomplish this goal?
8.
Which of the following ensures that an employee cannot continue carrying out fraudulent activities?
9.
Which of the following is used to both deploy and reapply baseline security configurations?
10.
Which of the following does a malicious insider install in order to attack the system at a predetermined date?