A customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of digital signatures is required?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of…

Continue ReadingA customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of digital signatures is required?

A company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code…

Continue ReadingA company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)

Which objective of secure communications is achieved by encrypting data?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which objective of secure communications is achieved by encrypting data? authentication availability confidentiality integrity Answers Explanation & Hints: When data is encrypted, it is scrambled to keep the data private…

Continue ReadingWhich objective of secure communications is achieved by encrypting data?

Which technique could be used by security personnel to analyze a suspicious file in a safe environment?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which technique could be used by security personnel to analyze a suspicious file in a safe environment? baselining blacklisting sandboxing whitelisting Answers Explanation & Hints: Sandboxing allows suspicious files to…

Continue ReadingWhich technique could be used by security personnel to analyze a suspicious file in a safe environment?

On a Windows host, which tool can be used to create and maintain block lists and allow lists?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

On a Windows host, which tool can be used to create and maintain block lists and allow lists? Task Manager Group Policy Editor Computer Management Local Users and Groups Answers…

Continue ReadingOn a Windows host, which tool can be used to create and maintain block lists and allow lists?

A security professional is making recommendations to a company for enhancing endpoint security. Which security endpoint technology would be recommended as an agent-based system to protect hosts against malware?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A security professional is making recommendations to a company for enhancing endpoint security. Which security endpoint technology would be recommended as an agent-based system to protect hosts against malware? baselining…

Continue ReadingA security professional is making recommendations to a company for enhancing endpoint security. Which security endpoint technology would be recommended as an agent-based system to protect hosts against malware?

What does the telemetry function provide in host-based security software?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What does the telemetry function provide in host-based security software? It enables host-based security programs to have comprehensive logging functions. It enables updates of malware signatures. It blocks the passage…

Continue ReadingWhat does the telemetry function provide in host-based security software?

Which technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats? network admission control website filtering and blacklisting network profiling threat intelligence…

Continue ReadingWhich technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats?

What does the incident handling procedures security policy describe?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What does the incident handling procedures security policy describe? It describes the procedure for auditing the network after a cyberattack. It describes the procedure for mitigating cyberattacks. It describes how…

Continue ReadingWhat does the incident handling procedures security policy describe?

Which two options are security best practices that help mitigate BYOD risks? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two options are security best practices that help mitigate BYOD risks? (Choose two.) Use wireless MAC address filtering. Decrease the wireless antenna gain level. Keep the device OS and…

Continue ReadingWhich two options are security best practices that help mitigate BYOD risks? (Choose two.)

What is a characteristic of the security artichoke, defense-in-depth approach?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a characteristic of the security artichoke, defense-in-depth approach? Each layer has to be penetrated before the threat actor can reach the target data or system. Threat actors no…

Continue ReadingWhat is a characteristic of the security artichoke, defense-in-depth approach?

Why is asset management a critical function of a growing organization against security threats?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Why is asset management a critical function of a growing organization against security threats? It serves to preserve an audit trail of all new purchases. It identifies the ever increasing…

Continue ReadingWhy is asset management a critical function of a growing organization against security threats?

What is the first line of defense when an organization is using a defense-in-depth approach to network security?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is the first line of defense when an organization is using a defense-in-depth approach to network security? IPS edge router firewall proxy server Answers Explanation & Hints: A defense-in-depth…

Continue ReadingWhat is the first line of defense when an organization is using a defense-in-depth approach to network security?

What is a characteristic of a layered defense-in-depth security approach?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is a characteristic of a layered defense-in-depth security approach? Three or more devices are used. Routers are replaced with firewalls. When one device fails, another one takes over. One…

Continue ReadingWhat is a characteristic of a layered defense-in-depth security approach?

In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.) assets that need protection location of attacker or attackers threats to…

Continue ReadingIn a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)