Which backup method will he select?

Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?A . Normal backupB . Warm backupC . Hot backupD . Cold backupView AnswerAnswer: C

April 25, 2021 No Comments READ MORE +

Which ISO standard will management decide to implement?

Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?A . ISO/IEC 27004B . ISO/IEC 27002C . ISO/IEC 27006D . ISO/IEC 27005View AnswerAnswer: D

April 25, 2021 No Comments READ MORE +

Which of the following password cracking techniques is the attacker trying?

An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the...

April 25, 2021 No Comments READ MORE +

They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?

An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS. They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor...

April 24, 2021 No Comments READ MORE +

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.A . Two-factor AuthenticationB . Smart Card AuthenticationC . Single-sign-onD . BiometricView AnswerAnswer: C

April 24, 2021 No Comments READ MORE +

Which type of attack is James analyzing?

James was inspecting ARP packets in his organization's network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. Which type of attack is James analyzing?A . ARP SweepB . ARP misconfigurationC...

April 23, 2021 No Comments READ MORE +

What type of network security approach is Daniel adopting?

Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?A . PreventativeB . ReactiveC . RetrospectiveD . Defense-in-depthView AnswerAnswer: B

April 23, 2021 No Comments READ MORE +

Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?

Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?A . Extreme...

April 23, 2021 No Comments READ MORE +

What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?

Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm's partners have asked that a secure wireless network be implemented in the office so employees can move about freely...

April 22, 2021 No Comments READ MORE +

Under which category of an information security policy does AUP fall into?

Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?A . System Specific Security Policy (SSSP)B . Incident Response Policy (IRP)C . Enterprise Information Security Policy...

April 20, 2021 No Comments READ MORE +