Which statement about digitally signing a document is true?
Which statement about digitally signing a document is true?A . The document is hashed and then the document is encrypted with the private key.B . The document is hashed and then the hash is encrypted with the private key.C . The document is encrypted and then the document is hashed...
Which definition describes the main purpose of a Security Information and Event Management solution ?
Which definition describes the main purpose of a Security Information and Event Management solution ?A . a database that collects and categorizes indicators of compromise to evaluate and search for potential security threatsB . a monitoring interface that manages firewall access control lists for duplicate firewall filteringC . a relay...
For which reason can HTTPS traffic make security monitoring difficult?
For which reason can HTTPS traffic make security monitoring difficult?A . encryptionB . large packet headersC . Signature detection takes longer.D . SSL interceptionView AnswerAnswer: A
You must create a vulnerability management framework. Which main purpose of this framework is true?
You must create a vulnerability management framework. Which main purpose of this framework is true?A . Conduct vulnerability scans on the network.B . Manage a list of reported vulnerabilities.C . Identify remove and mitigate system vulnerabilities.D . Detect and remove vulnerabilities in source code.View AnswerAnswer: C
Which two terms are types of cross site scripting attacks? (Choose two )
Which two terms are types of cross site scripting attacks? (Choose two )A . directedB . encodedC . storedD . reflectedE . cascadedView AnswerAnswer: CD
Which definition describes the main purpose of a Security Information and Event Management solution ?
Which definition describes the main purpose of a Security Information and Event Management solution ?A . a database that collects and categorizes indicators of compromise to evaluate and search for potential security threatsB . a monitoring interface that manages firewall access control lists for duplicate firewall filteringC . a relay...
Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?
Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?A . HTTP/TLSB . IPv4/IPv6C . TCP/UDPD . ATM/ MPLSView AnswerAnswer: B
Which network device is used to separate broadcast domains?
Which network device is used to separate broadcast domains?A . routerB . repeaterC . switchD . bridgeView AnswerAnswer: A
Which option is an advantage to using network-based anti-virus versus host-based anti-virus?
Which option is an advantage to using network-based anti-virus versus host-based anti-virus?A . Network-based has the ability to protect unmanaged devices and unsupported operating systems.B . There are no advantages compared to host-based antivirus.C . Host-based antivirus does not have the ability to collect newly created signatures.D . Network-based can...
In computer security, which information is the term PHI used to describe?
In computer security, which information is the term PHI used to describe?A . private host informationB . protected health informationC . personal health informationD . protected host informationView AnswerAnswer: B