Which of the following is considered best practice for preventing e-mail spoofing?

Which of the following is considered best practice for preventing e-mail spoofing?A . Cryptographic signatureB . Uniform Resource Locator (URL) filteringC . Spam filteringD . Reverse Domain Name Service (DNS) lookupView AnswerAnswer: A

July 20, 2020 No Comments READ MORE +

What is the MOST significant benefit of an application upgrade that replaces randomly generated session keys with certificate based encryption for communications with backend servers?

What is the MOST significant benefit of an application upgrade that replaces randomly generated session keys with certificate based encryption for communications with backend servers?A . Non-repudiationB . EfficiencyC . ConfidentiallyD . PrivacyView AnswerAnswer: A

July 20, 2020 No Comments READ MORE +

Which of the following combinations would MOST negatively affect availability?

Which of the following combinations would MOST negatively affect availability?A . Denial of Service (DoS) attacks and outdated hardwareB . Unauthorized transactions and outdated hardwareC . Fire and accidental changes to dataD . Unauthorized transactions and denial of service attacksView AnswerAnswer: A

July 20, 2020 No Comments READ MORE +

Which of the following is the GREATEST benefit of implementing a Role Based Access Control (RBAC) system?

Which of the following is the GREATEST benefit of implementing a Role Based Access Control (RBAC) system?A . Integration using Lightweight Directory Access Protocol (LDAP)B . Form-based user registration processC . Integration with the organizations Human Resources (HR) systemD . A considerably simpler provisioning processView AnswerAnswer: D

July 20, 2020 No Comments READ MORE +

The use of private and public encryption keys is fundamental in the implementation of which of the following?

The use of private and public encryption keys is fundamental in the implementation of which of the following?A . Diffie-Hellman algorithmB . Secure Sockets Layer (SSL)C . Advanced Encryption Standard (AES)D . Message Digest 5 (MD5)View AnswerAnswer: A

July 20, 2020 No Comments READ MORE +

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?A . Intrusion Prevention Systems (IPS)B . Intrusion Detection Systems (IDS)C . Stateful firewallsD . Network Behavior Analysis (NBA) toolsView AnswerAnswer: D

July 19, 2020 No Comments READ MORE +

Which of the following failures should the IT manager be concerned with?

A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?A . ApplicationB . StorageC . PowerD . NetworkView AnswerAnswer: C Explanation: Reference: https://www.colocationamerica.com/data-center/tier-standards-overview.htm

July 19, 2020 No Comments READ MORE +

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?A . Examine the device for physical tamperingB . Implement more stringent baseline configurationsC . Purge or re-image the hard disk driveD . Change access codesView AnswerAnswer: D

July 19, 2020 No Comments READ MORE +

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?A . Data tokenizationB . Volume encryptionC . Transparent Data Encryption (TDE)D . Column level database encryptionView AnswerAnswer: A

July 19, 2020 No Comments READ MORE +

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?A . Truncating parts of the dataB . Applying Access Control Lists (ACL) to the dataC . Appending non-watermarked data to watermarked dataD . Storing the data in...

July 19, 2020 No Comments READ MORE +