Which type of firewall service is John thinking of implementing?

John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?A . Application level gatewayB . Stateful Multilayer InspectionC . Circuit...

April 20, 2021 No Comments READ MORE +

What mode of ESP does Jacob need to use to encrypt the IP traffic?

The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol...

April 19, 2021 No Comments READ MORE +

Which could be a possible threat to network security?

During a security awareness program, management was explaining the various reasons which create threats to network security. Which could be a possible threat to network security?A . Configuring automatic OS updatesB . Having a web server in the internal networkC . Implementing VPND . Patch managementView AnswerAnswer: B

April 19, 2021 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT Identify the minimum number of drives required to setup RAID level 5. A . MultipleB . 3C . 4D . 2View AnswerAnswer: B

April 18, 2021 No Comments READ MORE +

What is the correct hierarchy for a security policy implementation?

Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented. What is the correct hierarchy for a security policy implementation?A . Laws, Policies, Regulations, Procedures and StandardsB ....

April 18, 2021 No Comments READ MORE +

Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.

Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.A . RingB . MeshC . BusD . StarView AnswerAnswer: A

April 18, 2021 No Comments READ MORE +

Which of the following is the correct order in the risk management phase?

Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase?A . Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & ReviewB . Risk Treatment, Risk Monitoring & Review,...

April 17, 2021 No Comments READ MORE +

Which of the following is a firewall that keeps track of the state of network connections traveling across it?

Which of the following is a firewall that keeps track of the state of network connections traveling across it?A . Stateful firewallB . Stateless packet filter firewallC . Circuit-level proxy firewallD . Application gateway firewallView AnswerAnswer: A Explanation: A stateful firewall is a firewall that keeps track of the state...

September 26, 2020 No Comments READ MORE +

Fill in the blank with the appropriate term. The_______________ is typically considered as the top InfoSec officer in the organization and helps in maintaining current and appropriate body of knowledge required to perform InfoSec management functions.

Fill in the blank with the appropriate term. The_______________ is typically considered as the top InfoSec officer in the organization and helps in maintaining current and appropriate body of knowledge required to perform InfoSec management functions.View AnswerAnswer: CISO Explanation: The Chief InfoSec Officer (CISO) is typically considered as the top...

September 26, 2020 No Comments READ MORE +

Which of the following is a standard protocol for interfacing external application software with an information server, commonly a Web server?

Which of the following is a standard protocol for interfacing external application software with an information server, commonly a Web server?A . DHCPB . IPC . CGID . TCPView AnswerAnswer: C Explanation: The Common Gateway Interface (CGI) is a standard protocol for interfacing external application software with an information server,...

September 26, 2020 No Comments READ MORE +