A) tailgating.
B) reconnaissance.
C) pharming.
D) prepending.
Correct Answer
verified
Multiple Choice
A) ISFW
B) UTM
C) SWG
D) CASB
Correct Answer
verified
Multiple Choice
A) To define the level or risk using probability and likelihood
B) To register the risk with the required regulatory agencies
C) To identify the risk, the risk owner, and the risk measures
D) To formally log the type of risk mitigation strategy the organization is using
Correct Answer
verified
Multiple Choice
A) A company implemented a network load balancer to ensure 99.999% availability of its web application.
B) A company designed a backup solution to increase the chances of restoring services in case of a natural disaster.
C) A company purchased an application-level firewall to isolate traffic between the accounting department and the information technology department.
D) A company purchased an IPS system, but after reviewing the requirements, the appliance was supposed to monitor, not block, any traffic.
E) A company purchased liability insurance for flood protection on all capital assets.
Correct Answer
verified
Multiple Choice
A) DNS cache poisoning
B) Domain hijacking
C) Distributed denial-of-service
D) DNS tunneling
Correct Answer
verified
Multiple Choice
A) validate the vulnerability exists in the organization's network through penetration testing.
B) research the appropriate mitigation techniques in a vulnerability database.
C) find the software patches that are required to mitigate a vulnerability.
D) prioritize remediation of vulnerabilities based on the possible impact.
Correct Answer
verified
Multiple Choice
A) The vulnerability scan output
B) The IDS logs
C) The full packet capture data
D) The SIEM alerts
Correct Answer
verified
Multiple Choice
A) RAID 0
B) RAID 1
C) RAID 5
D) RAID 10
Correct Answer
verified
Multiple Choice
A) Continuous delivery
B) Continuous integration
C) Continuous validation
D) Continuous monitoring
Correct Answer
verified
Showing 121 - 129 of 129
Related Exams