David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the______framework, as it provides a set of controls over IT and consolidates them to form a framework.

David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the______framework, as it provides a set of controls over IT and consolidates them to form a...

August 14, 2024 No Comments READ MORE +

Under which category of an information security policy does AUP fall into?

Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?A . System Specific Security Policy (SSSP)B . Incident Response Policy (IRP)C . Enterprise Information Security Policy...

August 14, 2024 No Comments READ MORE +

Katie has implemented the RAID level that split data into blocks and evenly write the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of________in order to setup.

Katie has implemented the RAID level that split data into blocks and evenly write the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of________in order to setup.A . Four drivesB . Three drivesC . Two drivesD . Six drivesView...

August 14, 2024 No Comments READ MORE +

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's _________integrity check mechanism provides security against a replay attack

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's _________integrity check mechanism provides security against a replay attackA . CRC-32B . CRC-MACC . CBC-MACD . CBC-32View AnswerAnswer: C Explanation: The integrity check mechanism used by WPA2 to provide security against replay attacks is...

August 14, 2024 No Comments READ MORE +

What RAID level is John considering to meet this requirement?

An US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that require a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations. What RAID level...

August 13, 2024 No Comments READ MORE +

Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an ______for legal advice to defend them against this allegation.

Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an ______for legal advice to defend them against this allegation.A . PR SpecialistB . AttorneyC . Incident HandlerD . Evidence ManagerView AnswerAnswer:...

August 13, 2024 No Comments READ MORE +

What are the other f unction(s) of the device?

A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other f unction(s) of the device? (Select all that apply)A . Provides access memory, achieving high efficiencyB . Assigns user addressesC . Enables input/output (I/O) operationsD . Manages security keysView AnswerAnswer: B,D Explanation: A VPN...

August 13, 2024 No Comments READ MORE +

What is the first step they should do to create the network vulnerability assessment plan?

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how...

August 12, 2024 No Comments READ MORE +

Identify the minimum number of drives required to setup RAID level 5.

Identify the minimum number of drives required to setup RAID level 5. A . MultipleB . 3C . 4D . 2View AnswerAnswer: B Explanation: RAID level 5 is a robust storage solution that provides fault tolerance and improved read performance. It requires a minimum of three drives to function. This...

August 12, 2024 No Comments READ MORE +

How will you prioritize these two incidents?

Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is...

August 12, 2024 No Comments READ MORE +