1. A company runs Linux servers in its own datacenter and also on a popular public cloud service provider. The servers hosted by the cloud provider can only be accessed with proper authorization and are only accessed by the company's datacenter. Which of the following BEST describes the type of cloud architecture being used? (Choose two.)(Select 2answers)
A) A. Private
B) B. Hybrid
C) C. Public
D) D. IaaS
E) E. PaaS
F) F. SaaS
2. A technician wants to have the ability to transfer files from home to the company's network on a regular basis. Which of the following is a remote access protocol the technician can utilize to bypass interactive user authentication by using a list of known host public keys?
A) A. FTP
B) B. SCP
C) C. TFTP
D) D. Telnet
3. Which of the following policies would be the MOST useful for defining the proper procedures when an employee is terminated abruptly?
A) A. Offboarding
B) B. Remote access
C) C. AUP
D) D. Incident response
E) E. DLP
4. A network technician is designing a network cable upgrade in a newly acquired office space. The IT manager wants to install a standardized twisted pair cable solution that supports speeds up to 1 Gbps and terminates with a standard RJ45 connector. Which of the following cable types should the technician suggest?
A) A. SMF
B) B. Cat 3
C) C. Cat 5
D) D. Cat 6
E) E. RG-6
5. Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?
A) A. An IPS
B) B. A protocol analyzer
C) C. A traffic shaper
D) D. An IDS