Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?A . Packet filteringB . Port services filteringC . Content filteringD . Application access controlView AnswerAnswer: A

August 22, 2021 No Comments READ MORE +

In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?

In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?A . CommunicationB . PlanningC . RecoveryD . EscalationView AnswerAnswer: A

August 22, 2021 No Comments READ MORE +

Which one of the following affects the classification of data?

Which one of the following affects the classification of data?A . Assigned security labelB . Multilevel Security (MLS) architectureC . Minimum query sizeD . Passage of timeView AnswerAnswer: D

August 22, 2021 No Comments READ MORE +

The key benefits of a signed and encrypted e-mail include

The key benefits of a signed and encrypted e-mail includeA . confidentiality, authentication, and authorization.B . confidentiality, non-repudiation, and authentication.C . non-repudiation, authorization, and authentication.D . non-repudiation, confidentiality, and authorization.View AnswerAnswer: B

August 22, 2021 No Comments READ MORE +

Which contract is BEST in offloading the task from the IT staff?

An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations...

August 21, 2021 No Comments READ MORE +

Which of the following is the FIRST action that a system administrator should take when it is revealed during a penetration test that everyone in an organization has unauthorized access to a server holding sensitive data?

Which of the following is the FIRST action that a system administrator should take when it is revealed during a penetration test that everyone in an organization has unauthorized access to a server holding sensitive data?A . Immediately document the finding and report to senior management.B . Use system privileges...

August 21, 2021 No Comments READ MORE +

Which of the following is a potential risk when a program runs in privileged mode?

Which of the following is a potential risk when a program runs in privileged mode?A . It may serve to create unnecessary code complexityB . It may not enforce job separation dutiesC . It may create unnecessary application hardeningD . It may allow malicious code to be insertedView AnswerAnswer: D

August 21, 2021 No Comments READ MORE +

Which of the following is MOST suited to quickly implement a control?

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?A . Add a new rule to the application layer firewallB . Block access to the serviceC . Install an Intrusion Detection System (IDS)D...

August 21, 2021 No Comments READ MORE +

The use of private and public encryption keys is fundamental in the implementation of which of the following?

The use of private and public encryption keys is fundamental in the implementation of which of the following?A . Diffie-Hellman algorithmB . Secure Sockets Layer (SSL)C . Advanced Encryption Standard (AES)D . Message Digest 5 (MD5)View AnswerAnswer: B

August 21, 2021 No Comments READ MORE +

Why MUST a Kerberos server be well protected from unauthorized access?

Why MUST a Kerberos server be well protected from unauthorized access?A . It contains the keys of all clients.B . It always operates at root privilege.C . It contains all the tickets for services.D . It contains the Internet Protocol (IP) address of all network entities.View AnswerAnswer: A

August 21, 2021 No Comments READ MORE +