Matt, the security administrator, is implementing a new design to minimize the footprint in the datacenter and reduce the amount of wasted resources without losing physical control of the equipment. Which of the following would Matt need to implement?

A. Visualization
B. Cloud computing
C. New ACLs
D. VLAN management


Answer: A. Visualization

Computer Science & Information Technology

You might also like to view...

________ is the process of evaluating input from a user to determine whether or not it is valid

Fill in the blank(s) with correct word

Computer Science & Information Technology

What process involves the changing of a program's internal structure without changing the way the program works?

A. Editing B. Code generation C. Code modification D. Code refactoring

Computer Science & Information Technology

Jane, the security administrator for a company, needs to assign permissions for users on her network. Which of the following would allow Jane to give ONLY the appropriate permissions necessary?

A. Separation of duties B. Job rotation C. Privilege escalation D. Least privilege

Computer Science & Information Technology

Some PCs and devices use special electronic pens (also called digital pens and tablet pens) that don’t scratch the screen and that contain buttons or switches; others accept input via a small metal or plastic ____.

A. pin B. pointer C. stick D. stylus

Computer Science & Information Technology