What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)

What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)A . An image contained in the messageB . Spelling and grammar errorsC . Threats of losing serviceD . Use of bold and italicsView AnswerAnswer:...

March 17, 2019 No Comments READ MORE +

A digitally signed e-mail message:

A digitally signed e-mail message:A . Validates the recipientB . Validates the senderC . Is encryptedD . Is virus-freeView AnswerAnswer: B Explanation: By digitally signing a message, you apply your unique digital mark to the message. The digital signature includes your certificate and public key. This information proves to the...

March 13, 2019 No Comments READ MORE +

Which server is best to use as a web server, considering the security and performance concerns?

Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one. Which server is best to use as a web server, considering the security and performance concerns?A...

March 12, 2019 No Comments READ MORE +

Passwords that contain recognizable words are vulnerable to a:

Passwords that contain recognizable words are vulnerable to a:A . Denial of Service attackB . Hashing attackC . Dictionary attackD . Replay attackView AnswerAnswer: C Explanation: A dictionary attack is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a...

March 12, 2019 No Comments READ MORE +

Physically securing servers prevents:

Physically securing servers prevents:A . TheftB . Compromise of the certificate chainC . Man-in-the middle attacksD . Denial of Service attacksView AnswerAnswer: A

March 8, 2019 No Comments READ MORE +

Keeping a server updated:

Keeping a server updated:A . Maximizes network efficiencyB . Fixes security holesC . Speeds up folder accessD . Synchronizes the serverView AnswerAnswer: B

March 7, 2019 No Comments READ MORE +

Account lockout policies are used to prevent which type of security attack?

Account lockout policies are used to prevent which type of security attack?A . Brute force attacksB . Users sharing passwordsC . Social engineeringD . Passwords being reused immediatelyView AnswerAnswer: A

March 6, 2019 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:

February 26, 2019 No Comments READ MORE +

Role separation improves server security by:

Role separation improves server security by:A . Enforcing principle of least privilege.B . Installing applications on separate hard disks.C . Physically separating high security servers from other servers.D . Placing servers on separate VLANs.View AnswerAnswer: A

February 20, 2019 No Comments READ MORE +

How should you secure these passwords?

Many Internet sites that you visit require a user name and password. How should you secure these passwords?A . Save them to a text fileB . Enable session cachingC . Configure the browser to save passwordsD . Save them to an encrypted fileE . Reuse the same passwordView AnswerAnswer: D

February 12, 2019 No Comments READ MORE +