N10-008 Exam Question 1

During an annual review of policy documents, a company decided to adjust its recovery time frames. The company agreed that critical applications can be down for no more than six hours, and the acceptable amount of data loss is no more than two hours. Which of the following should be documented as the RPO?
  • N10-008 Exam Question 2

    Which of the following attacks encrypts user data and requires a proper backup implementation to recover?
  • N10-008 Exam Question 3

    A technician is investigating a misconfiguration on a Layer 3 switch. When the technician logs in and runs a command, the following data is shown:
    Which of the following commands generated this output?
  • N10-008 Exam Question 4

    A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?
  • N10-008 Exam Question 5

    A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?