Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A previously unknown vulnerability with no public listing is called:

A.

Malware

B.

Zero-day

C.

Event

D.

Attack

An organization develops procedures to restore critical business processes after a major disruption. What plan is this?

A.

BCP

B.

IRP

C.

DRP

D.

None

How often should an organization test its BCP?

A.

Continually

B.

Annually

C.

Routinely

D.

Daily

Who should participate in creating a BCP?

A.

IT only

B.

Management only

C.

Members across the organization

D.

Finance only

A system architecture where one instance serves multiple user groups:

A.

Multithreading

B.

Multiprocessing

C.

Multitenancy

D.

Multi-cloud

What is the main objective of DRP after a breach shuts down systems?

A.

Relocation

B.

Employee safety

C.

Prosecution

D.

Restore systems

Which service uses a registered port?

A.

HTTP

B.

SMB

C.

TCP

D.

MS SQL Server

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

A.

TLS Renegotiation

B.

TLS Heartbeat

C.

TLS Session Resumption

D.

TLS FastTrack

Which is the most efficient and effective way to test a business continuity plan?

A.

Simulations

B.

Discussions

C.

Walkthroughs

D.

Reviews

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality