Identify the minimum number of drives required to setup RAID level 5.
Correct Answer:
B
Rick has implemented several firewalls and IDS systems across his enterprise network. What should he do to effectively correlate all incidents that pass through these security controls?
Correct Answer:
D
What command is used to terminate certain processes in an Ubuntu system?
Correct Answer:
C
Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _______ as it seperates the storage units from the servers and the user network.
Correct Answer:
A
John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a _______ and it has to adhere to the ________
Correct Answer:
A