Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?A . Generating and distributing spam messages.B . Conducting DDOS attacks.C . Scanning for system & application vulnerabilities.D . Undertaking vishing attacksView AnswerAnswer: D
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?A . System Integrity.B . Sandboxing.C . Intrusion Prevention System.D . Defence in depth.View AnswerAnswer: D Explanation: https://en.wikipedia.org/wiki/Defense_in_depth_(computing)
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?A . System Integrity.B . Sandboxing.C . Intrusion Prevention System.D . Defence in depth.View AnswerAnswer: D Explanation: https://en.wikipedia.org/wiki/Defense_in_depth_(computing)
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?A . Quality Assurance and ControlB . Dynamic verification.C . Static verification.D . Source code analysis.View AnswerAnswer: D
When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?
When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?A . Ensure they are competent to be able to do so and be able to justify their actions.B . Ensure they are being observed by a senior investigator in...
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?A . TOGAFB . SABSAC . PCI DSE . OWASView AnswerAnswer: B
Which of the following is MOST LIKELY to be described as a consequential loss?
Which of the following is MOST LIKELY to be described as a consequential loss?A . Reputation damage.B . Monetary theft.C . Service disruption.D . Processing errors.View AnswerAnswer: A
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?A . TOGAFB . SABSAC . PCI DSE . OWASView AnswerAnswer: B
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?A . TOGAFB . SABSAC . PCI DSE . OWASView AnswerAnswer: B
What system from the following does NOT natively support syslog events?
One traditional use of a SIEM appliance is to monitor for exceptions received via syslog. What system from the following does NOT natively support syslog events?A . Enterprise Wireless Access Point.B . Windows Desktop Systems.C . Linux Web Server Appliances.D . Enterprise Stateful Firewall.View AnswerAnswer: C