Which of the following is a common source for security incident information and guidance?
Which of the following is a common source for security incident information and guidance?A . Computer Emergency Response Team (CERT)B . Security incident response planC . Risk assessment reportD . IT forensics reportView AnswerAnswer: A
What type of malware is most likely responsible for these symptoms?
Your friend complains that they recently installed a new browser extension to help find online discounts. However, since installing it, they have been experiencing an excessive amount of pop-up ads and unrelated advertising banners on web pages. What type of malware is most likely responsible for these symptoms?A . Trojan...
Which concept ensures that only the intended recipients can read a message?
Which concept ensures that only the intended recipients can read a message?A . End-to-end encryptionB . Transfer encryptionC . TORD . Proxy serversView AnswerAnswer: A
What is an non-disclosure agreement (NDA)?
What is an non-disclosure agreement (NDA)?A . An agreement to not disclose any informationB . A contract that requires sharing confidential information with others in a business relationshipC . An agreement to disclose all informationD . An agreement to disclose some informationView AnswerAnswer: A
Which type of asymmetric encryption algorithm provides better security than an equivalent RSA key of the same size and is commonly used in mobile devices?
Which type of asymmetric encryption algorithm provides better security than an equivalent RSA key of the same size and is commonly used in mobile devices?A . RSAB . Diffie-HellmanC . ECCD . IDEAView AnswerAnswer: C
Which of the following is a network address used to identify devices in layer three of the OSI model?
Which of the following is a network address used to identify devices in layer three of the OSI model?A . TCP port numberB . DNS addressC . MAC addressD . IP addressView AnswerAnswer: D
What is a common function of adware?
What is a common function of adware?A . Encrypting data on a systemB . Stealing sensitive informationC . Displaying unwanted advertisementsD . Providing remote access to a systemView AnswerAnswer: C
Which of the following backup types only copies data that has changed since the last backup, regardless of which type of backup it was last performed?
Which of the following backup types only copies data that has changed since the last backup, regardless of which type of backup it was last performed?A . Full backupB . Incremental backupC . Differential backupD . Synthetic backupView AnswerAnswer: B
Which term describes the ability to prove that a specific individual or entity performed an action, such as sending a message or conducting a transaction?
Which term describes the ability to prove that a specific individual or entity performed an action, such as sending a message or conducting a transaction?A . Non-repudiationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: A
Which of the following is used to verify the identity of a website?
Which of the following is used to verify the identity of a website?A . X.509 digital certificateB . SSL/TLSC . Certificate Signing Request (CSR)D . Diffie-Hellman key exchangeView AnswerAnswer: A