New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A hacker gains access to a compony network and begins to intercept network traffic in order to steal login credentials which OSI layer is being attacked

A.

Data Link layer

B.

Physical layer

C.

Network Layer

D.

Application laver

Which of the following is not a protocol of the OSI layer 3

A.

IGMP

B.

IP

C.

ICMP

D.

SSH

Which of these activities is often associated with DR efforts?

A.

Running anti-malware solutions

B.

Scanning the IT environment for vulnerabilities

C.

Zero-day exploits

D.

Employees returning to the primary production location

Government can imposes financial penalties as a consequence of breaking a

A.

Standard

B.

Regulation

C.

Policy

D.

Procedures

Exhibit.

What is the PRIMARY purpose of a web application firewall (WAF)?

A.

To protect the web server from DDoS attacks

B.

To monitor network traffic for intrusions

C.

To filter and block malicious web traffic and requests

D.

To manage SSL certificates

What is the benefit of subnet

A.

By increasing network bandwidth

B.

By improving network security

C.

By reducing network congestion

D.

By simplifying network management

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n)

A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Who should participate in creation a business continuity plan

A.

Onlymembersfrom the management team

B.

only members from the IT department

C.

Onlymembersfrom thefinancedepartment

D.

Members from across the organization

Which of the following documents contains elements that are NOT mandatory

A.

Procedures

B.

Policies

C.

Regulations

D.

Guidelines

A standard that defines wired communications of network devices

A.

Switch

B.

Hub

C.

router

D.

Ethernet