Which backup method will he select?
Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?A . Normal backupB . Warm backupC . Hot backupD . Cold backupView AnswerAnswer: C
Which ISO standard will management decide to implement?
Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?A . ISO/IEC 27004B . ISO/IEC 27002C . ISO/IEC 27006D . ISO/IEC 27005View AnswerAnswer: D
Which of the following password cracking techniques is the attacker trying?
An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the...
They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?
An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS. They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor...
Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.
Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.A . Two-factor AuthenticationB . Smart Card AuthenticationC . Single-sign-onD . BiometricView AnswerAnswer: C
Which type of attack is James analyzing?
James was inspecting ARP packets in his organization's network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. Which type of attack is James analyzing?A . ARP SweepB . ARP misconfigurationC...
What type of network security approach is Daniel adopting?
Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?A . PreventativeB . ReactiveC . RetrospectiveD . Defense-in-depthView AnswerAnswer: B
Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?
Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?A . Extreme...
What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?
Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm's partners have asked that a secure wireless network be implemented in the office so employees can move about freely...
Under which category of an information security policy does AUP fall into?
Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?A . System Specific Security Policy (SSSP)B . Incident Response Policy (IRP)C . Enterprise Information Security Policy...