What device is used to cable network jacks from a wall into a central location for termination into a single punch down block?
What device is used to cable network jacks from a wall into a central location for termination into a single punch down block?A . RouterB . FirewallC . SwitchD . Patch panelView AnswerAnswer: D
Which of the following risk management strategies seeks to minimize risk to an acceptable level?
Which of the following risk management strategies seeks to minimize risk to an acceptable level?A . Risk avoidanceB . Risk transferC . Risk mitigationD . Risk acceptanceView AnswerAnswer: C
Which of the following is a fraudulent activity designed to deceive individuals into providing sensitive information or transferring funds to unauthorized parties in the context of IT security?
Which of the following is a fraudulent activity designed to deceive individuals into providing sensitive information or transferring funds to unauthorized parties in the context of IT security?A . Intrusion detection systemB . Data encryptionC . FirewallD . ScammingView AnswerAnswer: D
Which of the following is the BEST way to securely procure and install software?
Which of the following is the BEST way to securely procure and install software?A . Downloading software from an unsecured websiteB . Purchasing software from an unverified vendorC . Installing software from a USB driveD . Installing software from an app storeView AnswerAnswer: D
Which of the following is true about S/MIME?
Which of the following is true about S/MIME?A . S/MIME provides end-to-end encryption and digital signatures for email communications.B . S/MIME provides protection against spam.C . S/MIME is limited to certain email clients.D . S/MIME is a server that manages email communications.View AnswerAnswer: A
What is information classification?
What is information classification?A . The process of deleting informationB . The process of encrypting informationC . The process of categorizing information based on its sensitivityD . The process of sharing information with othersView AnswerAnswer: C
Which of the following provides even stronger security through the use of Simultaneous Authentication of Equals (SAE) encryption?
Which of the following provides even stronger security through the use of Simultaneous Authentication of Equals (SAE) encryption?A . WPA3B . WPA2C . WEPD . WPAView AnswerAnswer: A
What is blockchain?
What is blockchain?A . Blockchain is a digital currency.B . Blockchain is a type of database management systemC . Blockchain is a proprietary software platform developed by a single company.D . A type of database that uses a network of nodes to store information in a decentralized mannerView AnswerAnswer: D
Which of the following is an example of confidential information?
Which of the following is an example of confidential information?A . Publicly available informationB . Bug Bounty programsC . Public press releasesD . Personal identification numbers (PINs)View AnswerAnswer: D
Which of the following is a private IPv4 address?
Which of the following is a private IPv4 address?A . 2001:0db8:85a3:0000:0000:8a2e:0370:7334B . AC:DE:48:00:11:22C . 172.16.0.1D . 66.23.15.63View AnswerAnswer: C