Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A method for risk analysis that is based on the assignment of a descriptor such as low, medium, or high.

A.

Quantitative Risk Analysis

B.

Risk Assessment

C.

Risk Mitigation

D.

Qualitative Risk Analysis

What drove the introduction of IPv6?

A.

IPv4 was insecure

B.

IPv4 was incompatible

C.

IPv4 address exhaustion

D.

IPv6 supports Wi-Fi

Which of the following is NOT one of the four typical ways of managing risk?

A.

Accept

B.

Avoid

C.

Mitigate

D.

Monitor

Malicious code that acts like a remotely controlled “robot” for an attacker.

A.

Rootkit

B.

Malware

C.

Bot

D.

Virus

Access control used in high-security military and government environments:

A.

DAC

B.

MAC

C.

RBAC

D.

ABAC

Which security control is designed to prevent unauthorized access to sensitive information by ensuring it is accessible only to authorized users?

A.

Encryption

B.

Firewall

C.

Antivirus

D.

Access control

Which document serves as specifications for implementing policy and dictates mandatory requirements?

A.

Policy

B.

Guideline

C.

Standard

D.

Procedure

Which prevents threats?

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Are events that may indicate that an organization's systems or data have been compromised or that protective measures have failed.

A.

Exploit

B.

Security incident

C.

Threat

D.

Breach

Which cloud service model provides the most suitable environment for customers to build and operate their own software?

A.

SaaS

B.

IaaS

C.

PaaS