Which statement about digitally signing a document is true?

Which statement about digitally signing a document is true?A . The document is hashed and then the document is encrypted with the private key.B . The document is hashed and then the hash is encrypted with the private key.C . The document is encrypted and then the document is hashed...

March 19, 2019 No Comments READ MORE +

Which definition describes the main purpose of a Security Information and Event Management solution ?

Which definition describes the main purpose of a Security Information and Event Management solution ?A . a database that collects and categorizes indicators of compromise to evaluate and search for potential security threatsB . a monitoring interface that manages firewall access control lists for duplicate firewall filteringC . a relay...

March 15, 2019 No Comments READ MORE +

For which reason can HTTPS traffic make security monitoring difficult?

For which reason can HTTPS traffic make security monitoring difficult?A . encryptionB . large packet headersC . Signature detection takes longer.D . SSL interceptionView AnswerAnswer: A

March 14, 2019 No Comments READ MORE +

You must create a vulnerability management framework. Which main purpose of this framework is true?

You must create a vulnerability management framework. Which main purpose of this framework is true?A . Conduct vulnerability scans on the network.B . Manage a list of reported vulnerabilities.C . Identify remove and mitigate system vulnerabilities.D . Detect and remove vulnerabilities in source code.View AnswerAnswer: C

March 13, 2019 No Comments READ MORE +

Which two terms are types of cross site scripting attacks? (Choose two )

Which two terms are types of cross site scripting attacks? (Choose two )A . directedB . encodedC . storedD . reflectedE . cascadedView AnswerAnswer: CD

March 13, 2019 No Comments READ MORE +

Which definition describes the main purpose of a Security Information and Event Management solution ?

Which definition describes the main purpose of a Security Information and Event Management solution ?A . a database that collects and categorizes indicators of compromise to evaluate and search for potential security threatsB . a monitoring interface that manages firewall access control lists for duplicate firewall filteringC . a relay...

March 13, 2019 No Comments READ MORE +

Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?

Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?A . HTTP/TLSB . IPv4/IPv6C . TCP/UDPD . ATM/ MPLSView AnswerAnswer: B

March 13, 2019 No Comments READ MORE +

Which network device is used to separate broadcast domains?

Which network device is used to separate broadcast domains?A . routerB . repeaterC . switchD . bridgeView AnswerAnswer: A

March 11, 2019 No Comments READ MORE +

Which option is an advantage to using network-based anti-virus versus host-based anti-virus?

Which option is an advantage to using network-based anti-virus versus host-based anti-virus?A . Network-based has the ability to protect unmanaged devices and unsupported operating systems.B . There are no advantages compared to host-based antivirus.C . Host-based antivirus does not have the ability to collect newly created signatures.D . Network-based can...

March 9, 2019 No Comments READ MORE +

In computer security, which information is the term PHI used to describe?

In computer security, which information is the term PHI used to describe?A . private host informationB . protected health informationC . personal health informationD . protected host informationView AnswerAnswer: B

March 4, 2019 No Comments READ MORE +