Fill in the blank with the appropriate term. A _______________device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits

FILL BLANK Fill in the blank with the appropriate term. A _______________device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.View AnswerAnswer: biometric Explanation: A biometric device is used for uniquely recognizing humans based upon one or more intrinsic, physical, or behavioral traits....

September 24, 2020 No Comments READ MORE +

Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?

Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?A . Incident responseB . Incident handlingC . Incident managementD . Incident planningView AnswerAnswer: A Explanation: Incident response is a process that...

September 24, 2020 No Comments READ MORE +

Which of the following standards is an amendment to the original IEEE 802.11 and specifies security mechanisms for wireless networks?

Which of the following standards is an amendment to the original IEEE 802.11 and specifies security mechanisms for wireless networks?A . 802.11bB . 802.11eC . 802.11iD . 802.11aView AnswerAnswer: C Explanation:

September 24, 2020 No Comments READ MORE +

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?

Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?A . DsniffB . KisMACC . SnortD . KismetView AnswerAnswer: C Explanation: Snort is an open source...

September 23, 2020 No Comments READ MORE +

Fill in the blank with the appropriate term. ______________is a free open-source utility for network exploration and security auditing that is used to discover computers and services on a computer network, thus creating a "map" of the network

FILL BLANK Fill in the blank with the appropriate term. ______________is a free open-source utility for network exploration and security auditing that is used to discover computers and services on a computer network, thus creating a "map" of the network.View AnswerAnswer: Nmap Explanation: Nmap is a free open-source utility for...

September 23, 2020 No Comments READ MORE +

Which of the following are the responsibilities of the disaster recovery team? Each correct answer represents a complete solution. Choose all that apply.

Which of the following are the responsibilities of the disaster recovery team? Each correct answer represents a complete solution. Choose all that apply.A . To monitor the execution of the disaster recovery plan and assess the resultsB . To modify and update the disaster recovery plan according to the lessons...

September 23, 2020 No Comments READ MORE +

Fill in the blank with the appropriate file system. Alternate Data Streams (ADS) is a feature of the______________ file system, allowing more than one data stream to be associated with a filename

FILL BLANK Fill in the blank with the appropriate file system. Alternate Data Streams (ADS) is a feature of the______________ file system, allowing more than one data stream to be associated with a filename.View AnswerAnswer: NTFS Explanation: Alternate Data Streams (ADS) is a feature of the NTFS file system that...

September 23, 2020 No Comments READ MORE +

In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.

In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.A . The router does not have a configuration file.B . There is a need to set operating parameters.C . The user interrupts the boot sequence.D ....

September 23, 2020 No Comments READ MORE +

Which of the following is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion?

Which of the following is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion?A . Fire sprinklerB . Fire suppression systemC . Fire alarm systemD . Gaseous fire suppressionView AnswerAnswer: C Explanation: An automatic fire alarm system is designed for detecting the unwanted presence...

September 23, 2020 No Comments READ MORE +

Which of the following can be performed with software or hardware devices in order to record everything a person types using his or her keyboard?

Which of the following can be performed with software or hardware devices in order to record everything a person types using his or her keyboard?A . WarchalkingB . Keystroke loggingC . War dialingD . IRC botView AnswerAnswer: B Explanation: Keystroke logging is a method of logging and recording user keystrokes....

September 23, 2020 No Comments READ MORE +