In network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

In network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities? risk analysis penetration testing vulnerability assessment strength…

Continue ReadingIn network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities?

Which two statements correctly describe certificate classes used in the PKI? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two statements correctly describe certificate classes used in the PKI? (Choose two.) A class 0 certificate is for testing purposes. A class 0 certificate is more trusted than a…

Continue ReadingWhich two statements correctly describe certificate classes used in the PKI? (Choose two.)

What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity? PKI certificates symmetric keys hashing algorithms digital signatures Answers Explanation…

Continue ReadingWhat technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?

In a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

In a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself? from the root CA only from the root CA or from self-generation from the root…

Continue ReadingIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?

A customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of digital signatures is required?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of…

Continue ReadingA customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of digital signatures is required?

A company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code…

Continue ReadingA company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)

Which objective of secure communications is achieved by encrypting data?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which objective of secure communications is achieved by encrypting data? authentication availability confidentiality integrity Answers Explanation & Hints: When data is encrypted, it is scrambled to keep the data private…

Continue ReadingWhich objective of secure communications is achieved by encrypting data?

Which technique could be used by security personnel to analyze a suspicious file in a safe environment?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which technique could be used by security personnel to analyze a suspicious file in a safe environment? baselining blacklisting sandboxing whitelisting Answers Explanation & Hints: Sandboxing allows suspicious files to…

Continue ReadingWhich technique could be used by security personnel to analyze a suspicious file in a safe environment?

On a Windows host, which tool can be used to create and maintain block lists and allow lists?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

On a Windows host, which tool can be used to create and maintain block lists and allow lists? Task Manager Group Policy Editor Computer Management Local Users and Groups Answers…

Continue ReadingOn a Windows host, which tool can be used to create and maintain block lists and allow lists?

A security professional is making recommendations to a company for enhancing endpoint security. Which security endpoint technology would be recommended as an agent-based system to protect hosts against malware?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A security professional is making recommendations to a company for enhancing endpoint security. Which security endpoint technology would be recommended as an agent-based system to protect hosts against malware? baselining…

Continue ReadingA security professional is making recommendations to a company for enhancing endpoint security. Which security endpoint technology would be recommended as an agent-based system to protect hosts against malware?

What does the telemetry function provide in host-based security software?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What does the telemetry function provide in host-based security software? It enables host-based security programs to have comprehensive logging functions. It enables updates of malware signatures. It blocks the passage…

Continue ReadingWhat does the telemetry function provide in host-based security software?

Which technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats? network admission control website filtering and blacklisting network profiling threat intelligence…

Continue ReadingWhich technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats?

What does the incident handling procedures security policy describe?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What does the incident handling procedures security policy describe? It describes the procedure for auditing the network after a cyberattack. It describes the procedure for mitigating cyberattacks. It describes how…

Continue ReadingWhat does the incident handling procedures security policy describe?

Which two options are security best practices that help mitigate BYOD risks? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two options are security best practices that help mitigate BYOD risks? (Choose two.) Use wireless MAC address filtering. Decrease the wireless antenna gain level. Keep the device OS and…

Continue ReadingWhich two options are security best practices that help mitigate BYOD risks? (Choose two.)