Which of the following would be the BEST technology control to use in this scenario?

Correct Answer for the Question – Which of the following would be the BEST technology control to use in this scenario? is given below Which of the following would be the BEST technology control to use in this scenario? Content filtering IDS Audit logs DLP Correct Answer The Correct Answer for this Question is DLP Explanation … Read more

Which of the following should Ann use in order to sign the file?

Correct Answer for the Question – Which of the following should Ann use in order to sign the file? is given below Which of the following should Ann use in order to sign the file? Joe’s public key Joe’s private key Ann’s public key Ann’s private key Correct Answer The Correct Answer for this Question is … Read more

Which often crashes. In the past year, the server has crashed 10 times, requiring a system reboot to recover with only 10% loss of data or function. Which of the following is the ALE of this server?

Correct Answer for the Question – Which often crashes. In the past year, the server has crashed 10 times, requiring a system reboot to recover with only 10% loss of data or function. Which of the following is the ALE of this server? is given below Which often crashes. In the past year, the server has … Read more

Which of the following BEST addresses this concern?

Correct Answer for the Question – Which of the following BEST addresses this concern? is given below Which of the following BEST addresses this concern? Change the encryption from TKIP-based to CCMP-based. Set all nearby access points to operate on the same channel. Configure the access point to use WEP instead of WPA2. Enable all access … Read more

Which of the following would mitigate and secure the auditors finding?

Correct Answer for the Question – Which of the following would mitigate and secure the auditors finding? is given below Which of the following would mitigate and secure the auditors finding? Disable unnecessary contractor accounts and inform the auditor of the update. Reset contractor accounts and inform the auditor of the update. Inform the auditor that … Read more

Which of the following should be accessible locally from every site to ensure users with bad certificates cannot gain access to the network?

Correct Answer for the Question – Which of the following should be accessible locally from every site to ensure users with bad certificates cannot gain access to the network? is given below Which of the following should be accessible locally from every site to ensure users with bad certificates cannot gain access to the network? A … Read more

Which of the following supports this requirement?

Correct Answer for the Question – Which of the following supports this requirement? is given below Which of the following supports this requirement? Training staff on security policies Establishing baseline reporting Installing anti-malware software Disabling unnecessary accounts/services Correct Answer The Correct Answer for this Question is Establishing baseline reporting Explanation The Question – Which of the … Read more

Which can utilize EAP. Which of the following would BEST fit her objective?

Correct Answer for the Question – Which can utilize EAP. Which of the following would BEST fit her objective? is given below Which can utilize EAP. Which of the following would BEST fit her objective? CHAP SAML Kerberos Diameter Correct Answer The Correct Answer for this Question is Diameter Explanation The Question – Which can utilize … Read more

Which of the following provides the highest degree of protection from unauthorized wired network access?

Correct Answer for the Question – Which of the following provides the highest degree of protection from unauthorized wired network access? is given below Which of the following provides the highest degree of protection from unauthorized wired network access? Intrusion Prevention Systems MAC filtering Flood guards 802.1x Correct Answer The Correct Answer for this Question is … Read more