Which could be a possible threat to network security?

During a security awareness program, management was explaining the various reasons which create threats to network security. Which could be a possible threat to network security?A . Configuring automatic OS updatesB . Having a web server in the internal networkC . Implementing VPND . Patch managementView AnswerAnswer: B

April 19, 2021 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT Identify the minimum number of drives required to setup RAID level 5. A . MultipleB . 3C . 4D . 2View AnswerAnswer: B

April 18, 2021 No Comments READ MORE +

What is the correct hierarchy for a security policy implementation?

Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented. What is the correct hierarchy for a security policy implementation?A . Laws, Policies, Regulations, Procedures and StandardsB ....

April 18, 2021 No Comments READ MORE +

Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.

Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.A . RingB . MeshC . BusD . StarView AnswerAnswer: A

April 18, 2021 No Comments READ MORE +

Which of the following is the correct order in the risk management phase?

Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase?A . Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & ReviewB . Risk Treatment, Risk Monitoring & Review,...

April 17, 2021 No Comments READ MORE +

Which of the following is a firewall that keeps track of the state of network connections traveling across it?

Which of the following is a firewall that keeps track of the state of network connections traveling across it?A . Stateful firewallB . Stateless packet filter firewallC . Circuit-level proxy firewallD . Application gateway firewallView AnswerAnswer: A Explanation: A stateful firewall is a firewall that keeps track of the state...

September 26, 2020 No Comments READ MORE +

Fill in the blank with the appropriate term. The_______________ is typically considered as the top InfoSec officer in the organization and helps in maintaining current and appropriate body of knowledge required to perform InfoSec management functions.

Fill in the blank with the appropriate term. The_______________ is typically considered as the top InfoSec officer in the organization and helps in maintaining current and appropriate body of knowledge required to perform InfoSec management functions.View AnswerAnswer: CISO Explanation: The Chief InfoSec Officer (CISO) is typically considered as the top...

September 26, 2020 No Comments READ MORE +

Which of the following is a standard protocol for interfacing external application software with an information server, commonly a Web server?

Which of the following is a standard protocol for interfacing external application software with an information server, commonly a Web server?A . DHCPB . IPC . CGID . TCPView AnswerAnswer: C Explanation: The Common Gateway Interface (CGI) is a standard protocol for interfacing external application software with an information server,...

September 26, 2020 No Comments READ MORE +

Fill in the blank with the appropriate term. ______________ encryption is a type of encryption that uses two keys, i.e., a public key and a private key pair for data encryption. It is also known as public key encryption

FILL BLANK Fill in the blank with the appropriate term. ______________ encryption is a type of encryption that uses two keys, i.e., a public key and a private key pair for data encryption. It is also known as public key encryption.View AnswerAnswer: Asymmetric Explanation: Asymmetric encryption is a type of...

September 26, 2020 No Comments READ MORE +

Which of the following tools is a free laptop tracker that helps in tracking a user's laptop in case it gets stolen?

Which of the following tools is a free laptop tracker that helps in tracking a user's laptop in case it gets stolen?A . SAINTB . AdeonaC . SnortD . NessusView AnswerAnswer: B Explanation: Adeona is a free laptop tracker that helps in tracking a user's laptop in case it gets...

September 25, 2020 No Comments READ MORE +