Correct answer: Regression testing
If a freelance coding specialist tests it for security flaws, it is called regression testing.
Correct answer: Active-passive
Two load balancers are used in active-passive configurations, one of which is active. The second load balancer takes over when the active load balancer becomes unresponsive. The answers a, c, and d are incorrect. Load balancing algorithms such as round robin and least connections are not connected to fault tolerance when using multiple load balancers. Both load balancers are active at the same time and work cooperatively to distribute incoming traffic to back-end nodes in an active-active configuration. As a result, the right answer is b.
Correct answer: UPS
A device designed to provide emergency power during an unexpected main power source outage is called UPS.
Correct answer: HVAC
HVAC refers to an environmental control system.
Correct answer: a method of removing unwanted electrical discharge from connected components
Grounding allows any excess electrical charges to be securely transported away from the equipment receiving the power. This prevents the electrical spike from destroying the linked gadget right away.
Correct answer: Chain of custody
Correct answer: DMZ
Correct answer: SSH
SSH refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services.
Correct answer: CER
It's fine to share a.CER file containing a public certificate. A.PFX file (also known as a PKCS 12 archive) is different since it contains the private key, which should never be shared!
Correct answer: Power outage
Power outage refers to the term "Blackout".
Correct answer: Voltage drop (temporary)
The term "Brownout" refers to temporary drop in voltage.
Please select 3 correct answers
Correct answer: Uninterruptible Power Supply (UPS), RAID, Backup generator
The following solutions add(s) redundancy in areas identified as single points of failure.
Correct answer: a fire extinguisher of class C
For electrical fires, special dry fire prevention or extinguishing chemicals, such as carbon dioxide, should always be used.
Correct answer: Name of a high school teacher
Your address, first and last name, social security number, date of birth, and work details are included in personally identifiable information (Pll).
Correct answer: Screen filters
Correct answer: Data custodian
The data custodian is in charge of handling data on a day-to-day basis, including backups. The data custodian should back up the data in this scenario, while the data owner should determine the data's requirements.
Please select 2 correct answers
Correct answer: SAML & OpenID Connect
One way to federate with a cloud-based service is to use SAML, which has been around for a long time and is widely accepted. Another alternative is OpenID Connect, which is newer than SAML and gaining traction in the market. LDAP and Kerberos are authentication and directory integration protocols for on-premises systems; they are not appropriate for internet-based authentication.
Click for next FREE CompTIA Test
CompTIA Operational Practice Test #2