Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which is true about access rights?

A.

They limit users to permitted items.

B.

They are part of the System Development Life Cycle.

C.

They require the use of a compiler.

D.

They are defined by the machine language.

A company wants to ensure that the integrity of its systems is maintained during the startup process.

Which security technology can ensure the integrity of the system during startup by verifying that the system has not been compromised?

A.

Two-factor authentication

B.

Intrusion detection system (IDS)

C.

Hardware security module (HSM)

D.

Measured boot

A security team has been informed that user data on the network has been compromised.

What is the first step the organization should take to respond to this data breach?

A.

Notify affected users of the incident

B.

Implement an access control policy

C.

Increase encryption levels

D.

Publicly announce the breach

What are two roles of a DNS?

Choose 2 answers

A.

Creating IP addresses if it cannot find an alias

B.

Storing the IP address

C.

Translating an IP alias to an actual IP address

D.

Sending packets along a pathway that connects it to the Internet

A financial institution is concerned about a potential data breach due to employees accessing the company network using personal devices. They have decided to implement a bring your own device (BYOD) policy to mitigate the risk.

Which risk mitigation strategy will reduce the risk of a data breach in this scenario?

A.

Blocking access to the company network from personal devices

B.

Conducting regular security audits of the company network

C.

Implementing a mobile device management (MDM) solution

D.

Providing security awareness training for employees

Which two languages are scripted?

Choose 2 answers

A.

Python

B.

Ada

C.

PHP

D.

C

How are IT and globalization related?

A.

IT allows businesses to have a global reach.

B.

IT allows businesses to reach global HIPAA compliance.

C.

IT allows businesses to create tax havens for global companies.

D.

IT allows businesses to create a global common gateway interface (CGI).

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

A.

Phased

B.

Direct

C.

Parallel

D.

Pilot

What are two differences between a handheld computer and a desktop?

Choose 2 answers.

A.

A handheld has more memory.

B.

A desktop has more memory.

C.

A desktop has more internal storage.

D.

A handheld has more internal storage.

Which block cipher mode of operation for encrypting data is simple and efficient and provides no confidentiality beyond that of the underlying block cipher?

A.

Electronic codebook (ECB)

B.

Cipher block chaining (CBC)

C.

Counter (CTR)

D.

Output feedback (OFB)