Question 21
The management team has instituted a 48-hour RTO as part of the disaster recovery plan. Which of the following procedures would meet the policy's requirements?
Question 22
A user calls the IT department to report being unable to log in after locking the computer The user resets the password, but later in the day the user is again unable to log in after locking the computer Which of the following attacks against the user IS MOST likely taking place?
Question 23
Which of the following fouling protocols is generally used by major ISPs for handing large-scale internet traffic?
Question 24
A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?
Question 25
A network administrator is reviewing the network device logs on a syslog server. The messages are normal but the stamps on the messages are incorrect. Which of the following actions should the administrator take to ensure the log message time stamps are correct?