New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Hashing used to safe guard which CIA triad

A.

Confidentiality

B.

Availability

C.

Integrity

D.

AII

A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of

A.

Technical control

B.

Physical control

C.

Cloud control

D.

Management/Administrative control

Which addresses reserved for internal network use and are not routable on the internet.

A.

acOO:: to adff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

B.

fcOO:: to fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

C.

bcOO:: to bdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

D.

ccOO:: to cdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

Which plan provides the team with immediate response procedures and check lists and guidance for management?

A.

BCP

B.

IRP

C.

DRP

D.

ALL

Which of the following is not an element of system security configuration management

A.

Baselines

B.

Updates

C.

Inventory

D.

Audit logs

What security feature used in HTTPS

A.

IPSec

B.

SSH

C.

ICMP

D.

SSL/TLS

A device that routes traffic to the port of a known device

A.

Switch

B.

Hub

C.

Router

D.

Ethernet

What is sensitivity in the context of confidentiality

A.

The harm caused to externl stakeholders if information is disclosed or modified

B.

The ability of information to be accessed only by authorized individuals

C.

The need for protection assigned to information by its owner

D.

The Health status of the individuals

TCP and UDP reside at which layer of the osi model?

A.

Session

B.

Transport

C.

Data link

D.

Presentation

What is privacy in the context of Information Security?

A.

Protecting data from unauthorized access

B.

Ensuring data is accurate and unchanged

C.

Making sure data is always accessible when needed.

D.

Disclosed without their consent