TestOut 3.2.5 Questions and Answers 100% Pass
TestOut 3.2.5 Questions and Answers 100% Pass Your company has five salesmen who work out of the office and frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection implementation to address your concerns? Use cable locks to chain the laptops to the desks. Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network to set up remote access or backdoor access. Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select two. Each measure is part of a complete solution.) Place your networking equipment in a locked cage, Place your networking equipment in a room that requires key card entry. You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area where the office manager sits. The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the server closet. She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media. You notice the organization's network switch is kept in the server closet. You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. The office manager informs you that her desktop system no longer boots and asks you to repair or replace it, recovering as Implement a hardware checkout policy. Which of the following is the most important thing to do to prevent console access to the router? Keep the router in a locked room. Burning, pulping, and shredding are three ways to securely dispose of data in which form? Paper A computer or small network that is not connected to the rest of the network or the internet is known as: Air gap
Written for
- Institution
- TestOut 3.2.5
- Course
- TestOut 3.2.5
Document information
- Uploaded on
- April 16, 2024
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
testout 325 questions and answers 100 pass
Also available in package deal