Which cloud deployment model would be the best choice for them?
Dion Solutions, a large enterprise company, needs to deploy a new software application for their employees to use. They want to make sure that their employees have access to the latest version of the software and that it is easy to manage. Which cloud deployment model would be the best...
Which of the following devices is an example of an IoT device?
Which of the following devices is an example of an IoT device?A . RouterB . SmartphoneC . Desktop computerD . PrinterView AnswerAnswer: B
Which of the following fields in an X.509 certificate identifies the domain name of a website?
Which of the following fields in an X.509 certificate identifies the domain name of a website?A . IssuerB . SubjectC . ValidityD . subjectAltNameView AnswerAnswer: D
Which of the following terms refers to the deliberate act of accessing, manipulating, or deleting data without authorization?
Which of the following terms refers to the deliberate act of accessing, manipulating, or deleting data without authorization?A . FirewallB . EncryptionC . PhishingD . HackingView AnswerAnswer: D
What is multi-factor authentication (MFA)?
What is multi-factor authentication (MFA)?A . A tool used to bypass authenticationB . A security measure that uses only one factor to authenticate a userC . A security measure that uses multiple factors to authenticate a userD . A tool used to securely store passwordsView AnswerAnswer: C
What device is used to cable network jacks from a wall into a central location for termination into a single punch down block?
What device is used to cable network jacks from a wall into a central location for termination into a single punch down block?A . RouterB . FirewallC . SwitchD . Patch panelView AnswerAnswer: D
Which of the following risk management strategies seeks to minimize risk to an acceptable level?
Which of the following risk management strategies seeks to minimize risk to an acceptable level?A . Risk avoidanceB . Risk transferC . Risk mitigationD . Risk acceptanceView AnswerAnswer: C
Which of the following is a fraudulent activity designed to deceive individuals into providing sensitive information or transferring funds to unauthorized parties in the context of IT security?
Which of the following is a fraudulent activity designed to deceive individuals into providing sensitive information or transferring funds to unauthorized parties in the context of IT security?A . Intrusion detection systemB . Data encryptionC . FirewallD . ScammingView AnswerAnswer: D
Which of the following is the BEST way to securely procure and install software?
Which of the following is the BEST way to securely procure and install software?A . Downloading software from an unsecured websiteB . Purchasing software from an unverified vendorC . Installing software from a USB driveD . Installing software from an app storeView AnswerAnswer: D
Which of the following is true about S/MIME?
Which of the following is true about S/MIME?A . S/MIME provides end-to-end encryption and digital signatures for email communications.B . S/MIME provides protection against spam.C . S/MIME is limited to certain email clients.D . S/MIME is a server that manages email communications.View AnswerAnswer: A