- (Topic 2)
Which of the following categories of the network management model is used to detect and log network problems or device failures?
Correct Answer:
A
- (Topic 2)
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Correct Answer:
B
- (Topic 2)
You work as a Software Developer for Mansoft Inc. You, together with a team, develop a distributed application that processes orders from multiple types of clients. The application uses SQL Server to store data for all orders. The application does not implement any custom performance counters. After the application is deployed to production, it must be monitored for performance spikes. What will you do to monitor performance spikes in the application in a deployment environment?
Each correct answer represents a part of the solution. Choose all that apply.
Correct Answer:
ACD
- (Topic 3)
Which of the following are the types of Intrusion detection system?
Correct Answer:
CD
- (Topic 2)
Which of the following protocols implements VPN using IPSec?
Correct Answer:
D