In the context of Windows Security, what is a 'null' user?

In the context of Windows Security, what is a 'null' user?A . A user that has no skillsB . An account that has been suspended by the adminC . A pseudo account that has no username and passwordD . A pseudo account that was created for security administration purposeView AnswerAnswer:...

September 23, 2021 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network . What isA . this hacking process known as?B . GPS mappingC ....

September 22, 2021 1 Comment READ MORE +

Which of the following tools must the organization employ to protect its critical infrastructure?

An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization deckled to install an OT...

September 22, 2021 1 Comment READ MORE +

What is the name of the process by which you can determine those critical businesses?

On performing a risk assessment, you need to determine the potential impacts when some of the critical business processes of the company interrupt its service. What is the name of the process by which you can determine those critical businesses?A . Emergency Plan Response (EPR)B . Business Impact Analysis (BIA)C...

September 22, 2021 No Comments READ MORE +

Which AAA protocol is the most likely able to handle this requirement?

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol is the most likely able to handle this requirement?A . TACACS+B . DIAMETERC . KerberosD...

September 22, 2021 No Comments READ MORE +

Which of these is capable of searching for and locating rogue access points?

Which of these is capable of searching for and locating rogue access points?A . HIDSB . WISSC . WIPSD . NIDSView AnswerAnswer: C

September 22, 2021 No Comments READ MORE +

What is Peter Smith talking about?

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers...

September 22, 2021 No Comments READ MORE +

What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?

What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?A . The attacker queries a nameserver using the DNS resolver.B . The attacker makes a request to the DNS resolver.C . The attacker forges a reply from the DNS resolver.D ....

September 22, 2021 No Comments READ MORE +

What is not a PCI compliance recommendation?

What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....

September 21, 2021 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network . What isA . this hacking process known as?B . GPS mappingC ....

September 21, 2021 No Comments READ MORE +