What fundamental attribute of network defense is she enforcing?
Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any other communication, she mandates authentication before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?A . Integrity B....
To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?
To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?A . Prudent policy B. Paranoid policy C. Promiscuous policy D. Permissive policyView AnswerAnswer: A
In MacOS, how can the user implement disk encryption?
In MacOS, how can the user implement disk encryption?A . By enabling BitLocker feature B. By executing dm-crypt command C. By turning on Device Encryption feature D. By enabling FileVault featureView AnswerAnswer: D
Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?
Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?A . Pipe Model B. AAA model C. Hub-and-Spoke VPN model D. Hose modeView AnswerAnswer: A
Identify the type of event that is recorded when an application driver loads successfully in Windows.
Identify the type of event that is recorded when an application driver loads successfully in Windows.A . Success Audit B. Error C. Warning D. InformationView AnswerAnswer: D
What is the best option to do this job?
An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?A . Install a CCTV with cameras pointing to the entrance doors...
Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.
Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.A . Two-factor Authentication B. Smart Card Authentication C. Single-sign-on D. BiometricView AnswerAnswer: C
Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?
Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?A . Automated Field Correlation B. Field-Based Approach C. Rule-Based Approach D. Graph-Based ApproachView AnswerAnswer: A
Based on which of the following registry key, the Windows Event log audit configurations are recorded?
Based on which of the following registry key, the Windows Event log audit configurations are recorded?A . HKEY_LOCAL_MACHINESYSTEMServicesEventLog < ErrDev > B. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEventLog < EntAppsvc > C. HKEY_LOCAL_MACHINECurrentControlSetServicesEventLog< ESENT > D. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLog < Event Log >View AnswerAnswer: D
What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?
Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm's partners have asked that a secure wireless network be implemented in the office so employees can move about freely...