A company requires a disaster recovery site to have equipment ready to go in the event of a disaster at its main datacenter. The company does not have the budget to mirror all the live data to the disaster recovery site. Which of the following concepts should the company select?
c
A network administrator is preparing answers for an annual risk assessment that is required for compliance purposes. Which of the following would be an example of an internal threat?
c
A network administrator wants to control new router deployments via the use of application programming interfaces (APIs). This would be an example of:
a
An organization would like to implement a disaster recovery strategy that does not require a facility agreement or idle hardware. Which of the following strategies MOST likely meets the organizations requirements?
a
A network administrator redesigned the positioning of the APs to create adjacent areas of wireless coverage. After project validation, some users still report poor connectivity when their devices maintain an association to a distanced AP. Which of the following should the network administrator check FIRST?
a
A Chief Information Officer wants to monitor network breaching in a passive, controlled manner. Which of the following would be BEST to implement?
a
An IT officer is installing a new WAP. Which of the following must the officer change to connect users securely to the WAP?
a
Which of the following is used to track and document various types of known vulnerabilities?
a
A network administrator decided to use SLAAC in an extensive IPv6 deployment to alleviate IP address management. The devices were properly connected into the LAN but autoconfiguration of the IP address did not occur as expected. Which of the following should the network administrator verify?
a
A network administrator would like to purchase a device that provides access ports to endpoints and has the ability to route between networks.
Which of the following would be BEST for the administrator to purchase?
b