Which of the following policies would be BEST to deter a brute-force login attack?
A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?
The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?
A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible?