Which information security property is supported by encryption?

Which information security property is supported by encryption?A . sustainabilityB . integrityC . confidentialityD . availabilityView AnswerAnswer: C

August 9, 2018 No Comments READ MORE +

An intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources. Which evasion technique does this attempt indicate?

An intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources. Which evasion technique does this attempt indicate?A . traffic fragmentationB . resource exhaustionC . timing attackD . tunnelingView AnswerAnswer: B

August 9, 2018 No Comments READ MORE +

Drag the technology on the left to the data type the technology provides on the right

DRAG DROP Drag the technology on the left to the data type the technology provides on the right. View AnswerAnswer: 

August 7, 2018 No Comments READ MORE +

Based on which statement does the discretionary access control security model grant or restrict access ?

Based on which statement does the discretionary access control security model grant or restrict access ?A . discretion of the system administratorB . security policy defined by the owner of an objectC . security policy defined by the system administratorD . role of a user within an organizationView AnswerAnswer: B

August 6, 2018 No Comments READ MORE +

Based on which statement does the discretionary access control security model grant or restrict access ?

Based on which statement does the discretionary access control security model grant or restrict access ?A . discretion of the system administratorB . security policy defined by the owner of an objectC . security policy defined by the system administratorD . role of a user within an organizationView AnswerAnswer: B

August 6, 2018 No Comments READ MORE +

Which two features must a next generation firewall include? (Choose two.)

Which two features must a next generation firewall include? (Choose two.)A . data miningB . host-based antivirusC . application visibility and controlD . Security Information and Event ManagementE . intrusion detection systemView AnswerAnswer: CE

August 4, 2018 No Comments READ MORE +

You must create a vulnerability management framework. Which main purpose of this framework is true?

You must create a vulnerability management framework. Which main purpose of this framework is true?A . Conduct vulnerability scans on the network.B . Manage a list of reported vulnerabilities.C . Identify remove and mitigate system vulnerabilities.D . Detect and remove vulnerabilities in source code.View AnswerAnswer: C

July 27, 2018 No Comments READ MORE +

Which evasion method involves performing actions slower than normal to prevent detection?

Which evasion method involves performing actions slower than normal to prevent detection?A . traffic fragmentationB . tunnelingC . timing attackD . resource exhaustionView AnswerAnswer: C

July 23, 2018 No Comments READ MORE +