Enjoy 15% Discount With Coupon 15off

Monthly Archives - May 2021

Which of the following tools could be used to impersonate network resources and collect authentication requests?

During an internal penetration test, several multicast and broadcast name resolution requests are observed traversing the network. Which of the following tools could be used to impersonate network resources and collect authentication requests?A . EttercapB . TcpdumpC . ResponderD . MedusaView AnswerAnswer: C

Read more...

What are the responsibilities of the CRO?

What are the responsibilities of the CRO? Each correct answer represents a complete solution. Choose three.A . Managing the risk assessment processB . Implement corrective actionsC . Advising Board of DirectorsD . Managing the supporting risk management functionView AnswerAnswer: ABD Explanation: Chief Risk Officer is the executive-level manager in an...

Read more...

Under which of the following conditions does the General Data Protection Regulation NOT apply to the processing of personal data?

Under which of the following conditions does the General Data Protection Regulation NOT apply to the processing of personal data?A . When the personal data is processed only in non-electronic formB . When the personal data is collected and then pseudonymised by the controllerC . When the personal data is...

Read more...

What should you do?

You have the Azure virtual machines shown in the following table. A DNS service is install on VM1. You configure the DNS server settings for each virtual network as shown in the following exhibit. You need 10 ensure that all the virtual machines can resolve DNS names by using the...

Read more...