Question.66 Client-side virtualization guest machines have security requirements similar to physical machines, but they also need to ensure separation from other guest machines. Which of the following BEST describes this client-side guest security requirement? (A) Isolation (B) Authentication (C) Hardening (D) Authorization |
66. Click here to View Answer
Correct Answer: A
Question.67 A user connects a smartphone to a laptop. Which of the following types of networks has the user created? (A) PAN (B) MAN (C) WLAN (D) LAN |
67. Click here to View Answer
Correct Answer: A
Question.68 Recently, an organization received a number of spam emails that passed through the spam gateway. These emails contained generally the same information, but the sending domains were different. Which of the following solutions would BEST help mitigate the issue? A. Updating the keyword filtering B. Editing the sender policy framework C. Contacting the gateway vendor D. Verifying DMARC is enabled |
68. Click here to View Answer
Correct Answer: A
Question.69 Several users who share a multifunction printer in an office have reported unintended, thin, vertical lines that cover the entire height of every page printed from the printer. Which of the following steps should a technician complete in order to MOST likely resolve this issue? (A) Replace the printer paper with a new ream. (B) Clear the print spooler on each computer. (C) Reinstall the printer driver on each computer. (D) Perform the drum-cleaning procedure. |
69. Click here to View Answer
Correct Answer: D
Question.70 Which of the following should the data center hardware technician implement to ensure maximum uptime for customers’ virtual machines? (A) Line conditioner (B) AC voltage regulator (C) Uninterruptible power supply (D) Cloud storage backup |
70. Click here to View Answer
Correct Answer: C