Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following elements is the most important requirement to ensuring the success of a business continuity plan?

A.

Disaster Recover Plans

B.

Anticipating all relevant threats

C.

Executive buy-in

D.

Clearly defining roles and responsibilities

E.

Training

What is the fundamental problem with managing computers in stand-alone Windows workgroups?

A.

Computers in workgroups are not able to create Security Access Tokens (SATs) for their users.

B.

Once a computer joins a workgroup, the Security IDs (SIDs) of its users are transferred to the other computers in the workgroup in clear text.

C.

Computers that have Joined a workgroup cannot subsequently Join a domain.

D.

They do not accept the Security Access Tokens (SATs) from other computer.

Which of the following authentication methods are used by Wired Equivalent Privacy (WEP)? Each correct answer represents a complete solution. Choose two.

A.

Anonymous authentication

B.

Mutual authentication

C.

Open system authentication

D.

Shared key authentication

What security practice is described by NIST as the application of science to the identification, collection, examination, and analysis of data while maintaining data integrity and chain of custody?

A.

Digital forensics

B.

Vulnerability Assessments

C.

Penetration Tests

D.

Incident Response

What is the name of the registry key that is used to manage remote registry share permissions for the whole registry?

A.

regkey

B.

regmng

C.

winreg

D.

rrsreg

A simple cryptosystem that keeps the same letters and shuffles the order is an example of what?

A.

Permutation

B.

Rotation

C.

Monolithic

D.

Substitution

Which of the following TCP packet flags indicates that host should IMMEDIATELY terminate the connection containing the packet?

A.

FIN

B.

URG

C.

SYN

D.

RST

Which Authenticates Assurance Level requires a hardware-based authenticates?

A.

AAI1

B.

AAL3

C.

AAL2

How is confidentiality disabled in the IPSec Encapsulated Security Payload protocol?

A.

Selecting no algorithm for encryption or authentication

B.

Selecting the NULL authentication algorithm

C.

Selecting both NULL algorithms

D.

Selecting the NULL encryption algorithm

What is the term for the software that allows a single physical server to run multiple virtual servers?

A.

Virtual machine

B.

Hypervisor

C.

Host

D.

Guest