Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is commonly referred to as a Wi-Fi hot-spot?

A.

Local area network (LAN)

B.

Wireless local area network (WLAN)

C.

Wireless personal area network (WPAN)

D.

Wide area network (WAN)

Which control mechanism is used to detect the unauthorized modification of key configuration settings?

A.

Sandboxing

B.

Whitelisting

C.

URL filtering

D.

File integrity

Which of the following backup methods takes the MOST time for restoration of data?

A.

Incremental backup

B.

Offsite backup

C.

Full backup

D.

Differential backup

Availability can be protected through the use of:

A.

user awareness training and related end-user training.

B.

access controls. We permissions, and encryption.

C.

logging, digital signatures, and write protection.

D.

redundancy, backups, and business continuity management

When passwords are tied into key generation, the strength of the encryption algorithm is:

A.

voided.

B.

increased.

C.

diminished.

D.

maintained.

Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to "always on" mode?

A.

An adversary can predict a user's login credentials.

B.

Mobile connectivity could be severely weakened.

C.

A user's behavior pattern can be predicted.

D.

Authorization tokens could be exploited.

Which of the following is a team created PRIMARILY to improve the security posture of an organization?

A.

Computer emergency response team (CERT)

B.

Security operations center (SOC) team

C.

Disaster recovery team

D.

Risk management team

The protection of information from unauthorized access or disclosure is known as:

A.

access control.

B.

cryptograph

C.

media protect on.

D.

confidentiality.

Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?

A.

Fortified demilitarized zone

B.

Software defined perimeter

C.

Layer 3 virtual private network

D.

Virtual local area network

At which layer in the open systems interconnection (OSI) model does SSH operate?

A.

Presentation

B.

Session

C.

Application

D.

Network