New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following does not normally influence an organization's retention policy for logs?

A.

Laws

B.

Corporate governance

C.

Regulations

D.

Audits

Modern solutions try to provide a more holistic approach detecting rootkits, ransomware and spyware.

A.

Antivirus

B.

IDS

C.

IPS

D.

Anti Malware

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which one of the following controls would BEST achieve his objective?

A.

URL Filter

B.

IP Address Block

C.

DLP Solution

D.

IPS Solution

How does IPSec protect against reply attacks

A.

By using sequence numbers

B.

By limiting access to the network

C.

By using digital signatures

D.

By encryption all network traffic

What is the purpose of non-repudiation in information security?

A.

To ensure data is always accessible when needed

B.

To protect data from unauthorized access

C.

To prevent the sender or recipient of a message from denying having sent or received the message

D.

To ensure data is accurate and unchanged

Which Prevents Threat

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Which plan is activated when both the Incident response and BCP fails

A.

Risk Management

B.

BIA

C.

DRP

D.

None

Which of the following is NOT one of the four typical ways of managing risk?

A.

Accept

B.

Avoid

C.

Mitigate

D.

Monitor

Which encryption type used in HTTPS communication

A.

Symentric

B.

Assymentric

C.

None

D.

Both A and B

When Operating in A Cloud Environment, What Cloud Deployment Model Provides Security Teams With The Greatest Access To Forensic Information?

A.

FaaS

B.

SaaS

C.

PaaS

D.

laaS