New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which term describes a communication tunnel that provides point-to-point transmission of both authentication and data traffic over an untrusted network?

A.

Zero Trust

B.

DMZ

C.

VPN

D.

None of the Above

Which of the following is NOT one of the three main components of a sql database?

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

A.

TLS Renegotiation

B.

TLS Heartbeat

C.

TLS Session Resumption

D.

TLS FastTrack

In incident terminology the Zero day is

A.

Days with a cybersecurity incident

B.

A previously unknown system vulnerability

C.

Days without a cybersecurity incident

D.

Days to solve a previously unknown system vulnerability

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n)

A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Which is strongly used for Securing Wi-Fi

A.

WPA2

B.

WEP

C.

WPA

D.

SSL

The magnitude of the harm expected as a result of the consequences of an unauthorized disclosure, modification, destruction or loss of information is known as

A.

Threat

B.

Vulnerability

C.

Impact

D.

Likelihood

What is the end goal of DRP

A.

All System backup restored

B.

DR site activated

C.

Shifting the Infrastructure to new place

D.

Business restored to full last-known reliable operations.

An organization develops a set of procedures to restore critical business processes after a significant disruption. What type of plan is this?

A.

bcp

B.

IRP

C.

DRP

D.

None

What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?

A.

Least privilege

B.

Two person control

C.

Job rotation

D.

Separation of privileges