What may be the problem?

You are the Network Admin, and you get a compliant that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....

October 10, 2020 No Comments READ MORE +

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?A . SHA-2B . SHA-3C . SHA-1D . SHA-0View AnswerAnswer: C

October 10, 2020 No Comments READ MORE +

Why containers are less secure that virtual machines?

Why containers are less secure that virtual machines?A . Host OS on containers has a larger surface attack.B . Containers may full fill disk space of the host.C . A compromise container may cause a CPU starvation of the host.D . Containers are attached to the same virtual network.View AnswerAnswer:...

October 10, 2020 No Comments READ MORE +

Which of the following represents the best practice your business should observe?

Your business has decided to add credit card numbers to the data it backs up to tape. Which of the following represents the best practice your business should observe?A . Hire a security consultant to provide direction.B . Do not back up cither the credit card numbers or then hashes.C...

October 10, 2020 No Comments READ MORE +