Question 471

Company A has acquired Company B.
Company A has different domains spread globally, and typically migrates its acquisitions infrastructure under its own domain infrastructure. Company B, however, cannot be merged into Company A's domain infrastructure. Which of the following methods would allow the two companies to access one another's resources?
  • Question 472

    A company wants to host a publicly available server that performs the following functions:
    * Evaluates MX record lookup
    * Can perform authenticated requests for A and AAA records
    * Uses RRSIG
    Which of the following should the company use to fulfill the above requirements?
  • Question 473

    Ann is the IS manager for several new systems in which the classification of the systems' data are being
    decided. She is trying to determine the sensitivity level of the data being processed. Which of the following
    people should she consult to determine the data classification?
  • Question 474

    A systems administrator needs to integrate multiple loT and small embedded devices into the company's wireless network securely Witch of the following should the administrator implement to ensure low-power and legacy devices can connect to the wireless network?
  • Question 475

    A security administrator has written a script that will automatically upload binary and text-based configuration files onto a remote server using a scheduled task. The configuration files contain sensitive information. Which of the following should the administrator use? (Select TWO)