Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?

A.

Circuit-level

B.

Stateful

C.

Proxy

D.

Packet

(A systems analyst receives an error report and wants to quickly switch the rows to columns in order to match the format required for analysis. Which of the following spreadsheet functions should the analyst use to make this change?)

A.

Concat

B.

VLOOKUP

C.

Transpose

D.

Clean

A new retail store employee needs to be able to authenticate to a database. Which of the following commands should a database administrator use for this task?

A.

INSERT USER

B.

ALLOW USER

C.

CREATE USER

D.

ALTER USER

A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?

A.

ETL

B.

Replication

C.

Database dumping

D.

Backup and restore

(Evidence from logs shows multiple ongoing attempts to connect with a default account that was disabled. Which of the following best describes this type of attack?)

A.

Malware

B.

Brute-force

C.

On-path

D.

SQL injection