Which of the following is a motherboard chip that provides cryptographic services?
Which of the following log management tools has content filt…
Which of the following log management tools has content filtering?
You are working as a security expert in an e-commerce enterp…
You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps.How should you implement this without storing the customers’ credentials on the BuyMe server?
Which of the following methods can be used to destroy data o…
Which of the following methods can be used to destroy data on paper?
Under which vulnerability can an attacker steal information…
Under which vulnerability can an attacker steal information from a user’s phone using a device to connect to the phone without physically touching it?
Which of the following policies restrict employees from bein…
Which of the following policies restrict employees from being in a position to manipulate security configurations by limiting the time they spend with control of those configurations?
“Computer workstations must be locked when the workspace is…
“Computer workstations must be locked when the workspace is unoccupied and turned off at the end of the business day.” “Laptops must be either locked with a locking cable or locked in a drawer or filing cabinet.”Which policy includes these directives?
You are the chief security administrator in your enterprise….
You are the chief security administrator in your enterprise. You are asked to train every employee, from top-level officers to front gate security officers, to make them aware of various security risks. Which of the following training techniques should you use?
Which wireless probe is designed to scan and record wireless…
Which wireless probe is designed to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?
You have been hired as a security administrator. While analy…
You have been hired as a security administrator. While analyzing your organization’s personnel policies, you notice the presence of multiple orphaned accounts. How should you handle this situation?