Which of the following is a plain text protocol?
Which of the following is a plain text protocol?A . SSLB . HTTPC . TLSD . HTTPSView AnswerAnswer: B
Which of the following is a type of software that is embedded in hardware devices and provides instructions to the hardware to perform specific tasks?
Which of the following is a type of software that is embedded in hardware devices and provides instructions to the hardware to perform specific tasks?A . Desktop applicationsB . Server softwareC . FirmwareD . Web applicationsView AnswerAnswer: C
Which of the following is a fraudulent Wi-Fi access point that appears to be legitimate and is used to eavesdrop on wireless communications?
Which of the following is a fraudulent Wi-Fi access point that appears to be legitimate and is used to eavesdrop on wireless communications?A . Captive portalB . De-authentication attackC . Karma attackD . Evil twinView AnswerAnswer: D
Which of the following is a wired network connection commonly used for local area networks?
Which of the following is a wired network connection commonly used for local area networks?A . Twisted pairB . BluetoothC . Fiber opticD . CoaxialView AnswerAnswer: A
What is one of the primary factors that determines data retention requirements for backups?
What is one of the primary factors that determines data retention requirements for backups?A . The cost implications of retaining backup data for extended periodsB . The sensitivity of the data being backed upC . The length of time an organization has been in operationD . Regulatory requirements and complianceView...
What potential issue can arise from using some security tools that mistakenly identify legitimate activities as malicious?
What potential issue can arise from using some security tools that mistakenly identify legitimate activities as malicious?A . False positivesB . False negativesC . Improved detection accuracyD . Reduced system performance impactView AnswerAnswer: A
What security measure should you take to protect your information?
You are using a public Wi-Fi network at a coffee shop to access sensitive information. What security measure should you take to protect your information?A . Use a weak password for your accountsB . Share your login credentials with others using the same Wi-Fi networkC . Leave your computer unattended...
Which protocol is used to translate domain names into IP addresses?
Which protocol is used to translate domain names into IP addresses?A . DHCPB . SMTPC . 802.11D . DNSView AnswerAnswer: D
What is Trusted Computing?
What is Trusted Computing?A . A protocol for secure communication between devicesB . A method for encrypting data on a physical mediumC . A security standard for IoT devicesD . A set of hardware and software technologies to enhance securityView AnswerAnswer: D
What is the primary goal of an attacker who interrupts services, such as by launching a Distributed Denial of Service (DDoS) attack?
What is the primary goal of an attacker who interrupts services, such as by launching a Distributed Denial of Service (DDoS) attack?A . To manipulate or delete dataB . To extort ransom from the targeted organizationC . To cause a disruption in the availability of the targeted system or serviceD...