Which mobile device management feature prevents jailbreaking or rooting?

Correct Answer for the Question – Which mobile device management feature prevents jailbreaking or rooting? is given below Which mobile device management feature prevents jailbreaking or rooting? software distribution malware protection policy enforcement data loss prevention Correct Answer The Correct Answer for this Question is policy enforcement Explanation The Question – Which mobile device management feature … Read more

When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk?

Correct Answer for the Question – When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk? is given below When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk? limiting assuming trasnferring avoiding Correct … Read more

Which type of attack floods a target with ICMP requests?

Correct Answer for the Question – Which type of attack floods a target with ICMP requests? is given below Which type of attack floods a target with ICMP requests? route table poisoning reconnaissance IP spoofing denial-of-service Correct Answer The Correct Answer for this Question is denial-of-service Explanation The Question – Which type of attack floods a … Read more

Which protocol converts voice into a digital signal?

Correct Answer for the Question – Which protocol converts voice into a digital signal? is given below Which protocol converts voice into a digital signal? IVO VoIP SNMP IGMP Correct Answer The Correct Answer for this Question is VoIP Explanation The Question – Which protocol converts voice into a digital signal? has been answered correctly and … Read more

Which type of cloud computing service does an organization own and control application data, but not the application?

Correct Answer for the Question – Which type of cloud computing service does an organization own and control application data, but not the application? is given below Which type of cloud computing service does an organization own and control application data, but not the application? platform as a service computing as a service infrastructure as a … Read more

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.

Correct Answer for the Question – Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems. is given below Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems. It cannot identify command-and-control traffic. It cannot monitor all potential network ports. It assumes that all internal … Read more

What is the function of a hashing protocol?

Correct Answer for the Question – What is the function of a hashing protocol? is given below What is the function of a hashing protocol? encrypts data with encapsulation establishes an unencrypted tunnel establishes a secure tunnel provides data integrity Correct Answer The Correct Answer for this Question is provides data integrity Explanation The Question – … Read more

Which security component should be used to prevent a malware attack delivered by USB drive?

Correct Answer for the Question – Which security component should be used to prevent a malware attack delivered by USB drive? is given below Which security component should be used to prevent a malware attack delivered by USB drive? endpoint security password security physical security firewall security Correct Answer The Correct Answer for this Question is … Read more

Which option describes a characteristic of a distributed denial-of-service attack?

Correct Answer for the Question – Which option describes a characteristic of a distributed denial-of-service attack? is given below Which option describes a characteristic of a distributed denial-of-service attack? uses multiple types of malware to corrupt system services uses a single remote host to delete data from multiple target servers uses a single remote host to … Read more

What does a hypervisor enable?

Correct Answer for the Question – What does a hypervisor enable? is given below What does a hypervisor enable? high-speed searching of already aggregated security log files high-speed aggregation and viewing of security log files multiple physical machines to be configured into a high-performance cluster multiple guest operating systems to run on a single physical machine … Read more