A) Relying on a single sign-on based password manager
B) Enabling automatic full disk encryption to protect data with no productivity sacrifice
C) Automated data and file backups
D) Deploying all VPN connections in the transport mode
E) Using passphrases rather than passwords
Correct Answer
verified
Multiple Choice
A) Application security
B) External network security
C) Host security
D) Internal network security
E) Perimeter security
Correct Answer
verified
Multiple Choice
A) Border firewalls
B) Corporate file access control
C) Access Control List (ACL) on border routers
D) Demilitarized zone (DMZ)
E) Proxy servers
Correct Answer
verified
Multiple Choice
A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
Correct Answer
verified
Multiple Choice
A) confidentiality
B) integrity
C) authentication
D) access control
E) reliability
Correct Answer
verified
Multiple Choice
A) Password and passphrase
B) Access control list (ACL)
C) Digital signature and digital certificate
D) Biometric solutions (e.g., fingerprints) .
E) Security token
Correct Answer
verified
Multiple Choice
A) confidentiality (privacy)
B) data integrity
C) authentication
D) access control
E) spoofing detection
Correct Answer
verified
Multiple Choice
A) sniffing
B) spoofing
C) monitoring
D) phishing
E) scanning
Correct Answer
verified
Multiple Choice
A) Address filtering
B) Challenging
C) Certification
D) Authentication
E) Authorization
Correct Answer
verified
Multiple Choice
A) Confidentiality
B) Data integrity
C) Authentication
D) Authorization
E) Availability
Correct Answer
verified
Multiple Choice
A) Limiting
B) Simplicity
C) Layering
D) Defense-in-depth
E) Hiding
Correct Answer
verified
Multiple Choice
A) Corporate-wide data encryption
B) Regulatory compliance self-assessment
C) Security policies & procedures
D) Security awareness & training
E) Information security self-assessment
Correct Answer
verified
Multiple Choice
A) social engineering
B) denial of service
C) malware
D) fingerprinting
E) man-in-the-middle
Correct Answer
verified
Showing 1 - 13 of 13
Related Exams