What fundamental attribute of network defense is she enforcing?

Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any other communication, she mandates authentication before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?A . Integrity B....

May 23, 2023 No Comments READ MORE +

To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?

To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?A . Prudent policy B. Paranoid policy C. Promiscuous policy D. Permissive policyView AnswerAnswer: A

May 23, 2023 No Comments READ MORE +

In MacOS, how can the user implement disk encryption?

In MacOS, how can the user implement disk encryption?A . By enabling BitLocker feature B. By executing dm-crypt command C. By turning on Device Encryption feature D. By enabling FileVault featureView AnswerAnswer: D

May 22, 2023 No Comments READ MORE +

Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?A . Pipe Model B. AAA model C. Hub-and-Spoke VPN model D. Hose modeView AnswerAnswer: A

May 22, 2023 No Comments READ MORE +

Identify the type of event that is recorded when an application driver loads successfully in Windows.

Identify the type of event that is recorded when an application driver loads successfully in Windows.A . Success Audit B. Error C. Warning D. InformationView AnswerAnswer: D

May 21, 2023 No Comments READ MORE +

What is the best option to do this job?

An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?A . Install a CCTV with cameras pointing to the entrance doors...

May 21, 2023 No Comments READ MORE +

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the-------------------------- authentication technique to satisfy the management request.A . Two-factor Authentication B. Smart Card Authentication C. Single-sign-on D. BiometricView AnswerAnswer: C

May 21, 2023 No Comments READ MORE +

Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?A . Automated Field Correlation B. Field-Based Approach C. Rule-Based Approach D. Graph-Based ApproachView AnswerAnswer: A

May 21, 2023 No Comments READ MORE +

Based on which of the following registry key, the Windows Event log audit configurations are recorded?

Based on which of the following registry key, the Windows Event log audit configurations are recorded?A . HKEY_LOCAL_MACHINESYSTEMServicesEventLog < ErrDev > B. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEventLog < EntAppsvc > C. HKEY_LOCAL_MACHINECurrentControlSetServicesEventLog< ESENT > D. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLog < Event Log >View AnswerAnswer: D

May 20, 2023 No Comments READ MORE +

What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?

Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm's partners have asked that a secure wireless network be implemented in the office so employees can move about freely...

May 20, 2023 No Comments READ MORE +