Correct answer: Name of a high school teacher
Your address, first and last name, social security number, date of birth, and work details are included in personally identifiable information (Pll).
Correct answer: Data custodian
The data custodian is in charge of handling data on a day-to-day basis, including backups. The data custodian should back up the data in this scenario, while the data owner should determine the data's requirements.
Correct answer: Power outage
Power outage refers to the term "Blackout".
Correct answer: a fire extinguisher of class C
For electrical fires, special dry fire prevention or extinguishing chemicals, such as carbon dioxide, should always be used.
Correct answer: Active-passive
Two load balancers are used in active-passive configurations, one of which is active. The second load balancer takes over when the active load balancer becomes unresponsive. The answers a, c, and d are incorrect. Load balancing algorithms such as round robin and least connections are not connected to fault tolerance when using multiple load balancers. Both load balancers are active at the same time and work cooperatively to distribute incoming traffic to back-end nodes in an active-active configuration. As a result, the right answer is b.
Correct answer: DMZ
Correct answer: Regression testing
If a freelance coding specialist tests it for security flaws, it is called regression testing.
Correct answer: HVAC
HVAC refers to an environmental control system.
Correct answer: Voltage drop (temporary)
The term "Brownout" refers to temporary drop in voltage.
Correct answer: Chain of custody
Correct answer: a method of removing unwanted electrical discharge from connected components
Grounding allows any excess electrical charges to be securely transported away from the equipment receiving the power. This prevents the electrical spike from destroying the linked gadget right away.
Correct answer: CER
It's fine to share a.CER file containing a public certificate. A.PFX file (also known as a PKCS 12 archive) is different since it contains the private key, which should never be shared!
Correct answer: Screen filters
Please select 3 correct answers
Correct answer: Uninterruptible Power Supply (UPS), RAID, Backup generator
The following solutions add(s) redundancy in areas identified as single points of failure.
Please select 2 correct answers
Correct answer: SAML & OpenID Connect
One way to federate with a cloud-based service is to use SAML, which has been around for a long time and is widely accepted. Another alternative is OpenID Connect, which is newer than SAML and gaining traction in the market. LDAP and Kerberos are authentication and directory integration protocols for on-premises systems; they are not appropriate for internet-based authentication.
Correct answer: SSH
SSH refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services.
Correct answer: UPS
A device designed to provide emergency power during an unexpected main power source outage is called UPS.
Click for next FREE CompTIA Test
CompTIA Operational Practice Test #2