Which of the following uses are NOT usual ways that attackers have of leveraging botnets?

Which of the following uses are NOT usual ways that attackers have of leveraging botnets?A . Generating and distributing spam messages.B . Conducting DDOS attacks.C . Scanning for system & application vulnerabilities.D . Undertaking vishing attacksView AnswerAnswer: D

April 20, 2021 No Comments READ MORE +

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?A . System Integrity.B . Sandboxing.C . Intrusion Prevention System.D . Defence in depth.View AnswerAnswer: D Explanation: https://en.wikipedia.org/wiki/Defense_in_depth_(computing)

April 19, 2021 No Comments READ MORE +

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?A . System Integrity.B . Sandboxing.C . Intrusion Prevention System.D . Defence in depth.View AnswerAnswer: D Explanation: https://en.wikipedia.org/wiki/Defense_in_depth_(computing)

April 19, 2021 No Comments READ MORE +

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?A . Quality Assurance and ControlB . Dynamic verification.C . Static verification.D . Source code analysis.View AnswerAnswer: D

April 18, 2021 No Comments READ MORE +

When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?

When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?A . Ensure they are competent to be able to do so and be able to justify their actions.B . Ensure they are being observed by a senior investigator in...

April 18, 2021 No Comments READ MORE +

Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?

Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?A . TOGAFB . SABSAC . PCI DSE . OWASView AnswerAnswer: B

April 17, 2021 No Comments READ MORE +

Which of the following is MOST LIKELY to be described as a consequential loss?

Which of the following is MOST LIKELY to be described as a consequential loss?A . Reputation damage.B . Monetary theft.C . Service disruption.D . Processing errors.View AnswerAnswer: A

April 17, 2021 No Comments READ MORE +

Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?

Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?A . TOGAFB . SABSAC . PCI DSE . OWASView AnswerAnswer: B

April 16, 2021 No Comments READ MORE +

Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?

Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?A . TOGAFB . SABSAC . PCI DSE . OWASView AnswerAnswer: B

April 16, 2021 No Comments READ MORE +

What system from the following does NOT natively support syslog events?

One traditional use of a SIEM appliance is to monitor for exceptions received via syslog. What system from the following does NOT natively support syslog events?A . Enterprise Wireless Access Point.B . Windows Desktop Systems.C . Linux Web Server Appliances.D . Enterprise Stateful Firewall.View AnswerAnswer: C

April 16, 2021 No Comments READ MORE +