Which system consists of a publicly available set of databases that contain domain name registration contact information?
Which system consists of a publicly available set of databases that contain domain name registration contact information?A . WHOISB . CAPTCHAC . IANAD . IETFView AnswerAnswer: A
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
Which of the following programs is usually targeted at Microsoft Office products?
Which of the following programs is usually targeted at Microsoft Office products?A . Polymorphic virusB . Multipart virusC . Macro virusD . Stealth virusView AnswerAnswer: C Explanation: A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application...
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....
What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?
What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?A . Behavioral basedB . Heuristics basedC . Honeypot basedD . Cloud basedView AnswerAnswer: D
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?A . Preparation phaseB . Containment phaseC . Identification phaseD . Recovery phaseView AnswerAnswer: A
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning treeB . Dynamic ARP Inspection (DAI)C . Port securityD . Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B Explanation:...
What is the best security policy concerning this setup?
A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup?A . Network elements must...
Which of the following is a command line packet analyzer similar to GUI-based Wireshark?
Which of the following is a command line packet analyzer similar to GUI-based Wireshark?A . nessusB . tcpdumpC . etherealD . jack the ripperView AnswerAnswer: B Explanation: Tcpdump is a data-network packet analyzer computer program that runs under a command-line interface. It allows the user to display TCP/IP and other...