You are configuring a new file server for your company's local network. The network includes a variety of devices, including some legacy systems that still require SMB1 for file sharing.
However, you are aware of the security vulnerabilities associated with SMB1. You want to ensure that the network is secure while still accommodating the legacy systems.
What is the BEST approach for you to take in this situation?
Enable SMB1 on the file server and disable all other versions of SMB.
Enable SMB1 but also enable SMB3 and configure message encryption for sensitive shares.
Completely disable SMB on the file server and use FTP for file sharing instead.
Disable SMB1 and require all devices to use SMB3.
Enable SMB1 but also enable SMB3 and configure message encryption for sensitive shares.
What should be done with data that has been lost between the Recovery Point Objective (RPO) and the present time?
It should trigger an immediate system shutdown.
It should be immediately backed up again.
It should be accepted as a loss or reconstructed.
It should be ignored as it is not critical.
It should be accepted as a loss or reconstructed.
Why would an organization choose to upgrade from a TDM-based PBX to a VoIP PBX?
To increase the cost of international calls
To reduce flexibility in call routing
To integrate voice and data communications over the same network
To limit the features available for voice communications
To integrate voice and data communications over the same network
What is the purpose of configuring multiple reference time sources for NTP?
To decrease the load on the primary time server
To allow the NTP algorithm to detect drifting or incorrect time values
To comply with international timekeeping standards
To increase the network bandwidth
To allow the NTP algorithm to detect drifting or incorrect time values
What does SMTP use to discover the IP address of the recipient's SMTP server?
The sender's IP address
The recipient's email password
The domain name part of the recipient's email address
The recipient's physical address
The domain name part of the recipient's email address
What does the term "stateless protocol" imply about HTTP?
Each request from a client to a server is treated as a new request.
The server requires authentication for every request.
The server retains information about client requests indefinitely.
The server stores data in a centralized database for all requests.
Each request from a client to a server is treated as a new request.
During a routine audit, it's discovered that the Recovery Time Objective (RTO) for a critical system is set to 24 hours. However, the business impact analysis (BIA) indicates that any downtime longer than 12 hours could result in significant financial and reputational damage.
What should be the immediate course of action?
Adjust the RTO to align with the findings of the BIA.
Conduct a tabletop exercise focusing on other non-critical systems.
Increase the RTO to 48 hours to provide more flexibility.
Ignore the BIA findings as the current RTO has been effective so far.
Adjust the RTO to align with the findings of the BIA.
You are setting up a new office for your company, which includes installing VoIP phones for all employees.
You want to ensure that voice traffic does not interfere with the company's data traffic and vice versa. You also want to make sure that the VoIP phones can be used even if there are power outages.
What should you do to meet these requirements?
Configure separate VLAN IDs for voice and data traffic and use traditional power cables for the VoIP phones.
Configure separate VLAN IDs for voice and data traffic and ensure the VoIP phones support Power over Ethernet (PoE).
Use digital certificates and connect phones directly to the Internet without a LAN.
Connect all VoIP phones to a dedicated Wi-Fi network separate from the company's main network
Configure separate VLAN IDs for voice and data traffic and ensure the VoIP phones support Power over Ethernet (PoE).
Which IEEE standard defines the Precision Time Protocol (PTP)?
IEEE 1149.1
IEEE 802.11
IEEE 802.3
IEEE 1588
IEEE 1588
What is the purpose of the STARTTLS command in SMTP?
o downgrade the connection to an unsecure state
To create a new email account
To encrypt the entire email message content
To upgrade an existing unsecure connection to use TLS
To upgrade an existing unsecure connection to use TLS
What is the default port for IMAPS, the secure version of IMAP?
TCP/443
TCP/25
TCP/143
TCP/993
TCP/993
While performing a resiliency test for availability, a technician is trying to calculate the amount of data loss that a system can sustain before the data is unrecoverable if it was targeted by a virus, and just how far back in time from the disaster that would be.
What is the technician testing for?
Recovery point objective
Recovery time objective
Work recovery time
Maximum tolerable downtime
Recovery point objective
What does the secure version of SIP (SIPS) use to authenticate the endpoints and establish a TLS tunnel?
VLAN IDs
Power over Ethernet
Echo test calls
Digital certificates
Digital certificates
Which of the following time standards does NTP use?
UTC
PDT
EDT
CDT
UTC
What does the term "stateless protocol" imply about HTTP?
Each request from a client to a server is treated as a new request.
The server requires authentication for every request.
The server retains information about client requests indefinitely.
The server stores data in a centralized database for all requests.
Each request from a client to a server is treated as a new request.
What can be configured to require encryption and drop connections if a valid security profile is not available?
The database's replication process
The database server or the client
The database's graphical user interface
The database's storage capacity
The database server or the client
What is the significance of conducting validation tests in disaster recovery?
To assess the effectiveness of marketing strategies
To ensure services can be restored
To evaluate the company's financial health
To increase the company's market share
To ensure services can be restored
What is the primary function of a Private Branch Exchange (PBX)?
To serve as a firewall for an organization's network
To provide internet access to an organization
To act as an automated switchboard for voice lines
To encrypt voice communications
To act as an automated switchboard for voice lines
Why is SSL now considered completely obsolete?
It was too complex to implement.
It increased data transmission costs.
It was only compatible with HTTP.
It has been replaced by more secure versions of TLS.
It has been replaced by more secure versions of TLS.
You are setting up a secure website for your online store. You want to ensure that all data transmitted between your website and your customers is encrypted.
Which of the following steps is essential for you to achieve this?
Obtain and install a digital certificate.
Increase your website's bandwidth.
Implement a CAPTCHA system on your website.
Install a web analytics tool.
Obtain and install a digital certificate.
What is a major benefit of using RAID with NAS devices?
It enhances the firewall capabilities.
It spreads information between disks for data availability.
It reduces the need for physical storage space.
It increases the internet speed.
It spreads information between disks for data availability.
In the event of a nationwide emergency, what is a potential issue with leased disaster recovery sites?
Demand for services is likely to exceed supply.
They are always readily available.
They are less expensive than other options.
They offer immediate failover without any setup.
Demand for services is likely to exceed supply.
What is the primary purpose of Transport Layer Security (TLS)?
To authenticate and encrypt TCP connections
To increase the speed of data transmission over the Internet
To manage network traffic and reduce congestion
To compress data for efficient storage
To authenticate and encrypt TCP connections
In FTP active mode, how does the data connection get established?
The client sends a PORT command specifying its data connection port number to the server.
The client sends a PASV command to the server.
The server initiates the connection without client interaction.
The server sends a PORT command to the client.
The client sends a PORT command specifying its data connection port number to the server.
What can happen if a server or host is configured with the incorrect time?
It will increase the security of network communications
It may not be able to access network services
It can lead to increased network speed
It will automatically correct itself without NTP
It may not be able to access network services