Which of the following allows a technician to scan for missing patches on a device without actually attempting
Which of the following allows a technician to scan for missing patches on a device without actually attempting to exploit the security problem?
Which of the following uses a key ring?
Which of the following uses a key ring?
Using an asymmetric key cryptography system, where can a technician generate the key pairs?
Using an asymmetric key cryptography system, where can a technician generate the key pairs?
Which of the following allows a file to have different security permissions for users that have the same roles
Which of the following allows a file to have different security permissions for users that have the same roles or user groups?
Which of the following would be BEST to use to apply corporate security settings to a device?
Which of the following would be BEST to use to apply corporate security settings to a device?
Which of the following would BEST diagnose which NIC is causing this problem?
A technician suspects that one of the network cards on the internal LAN is causing a broadcast storm. Which of the following would BEST diagnose which NIC is causing this problem?
Which of the following type of attacks is similar to this product?
A CEO is concerned about staff browsing inappropriate material on the Internet via HTTPS. It has been suggested that the company purchase a product which could decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing. Which of the following type of attacks is similar to this product?
In this instance, which of the following is the BEST course of action?
After a system risk assessment was performed it was found that the cost to mitigate the risk was higher than the expected loss if the risk was actualized. In this instance, which of the following is the BEST course of action?
If determining the risk, which of the following is the annual loss expectancy (ALE)?
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of 5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If determining the risk, which of the following is the annual loss expectancy (ALE)?
If the anti-malware software is purchased, which of the following is the expected net savings?
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of 5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If the anti-malware software is purchased, which of the following is the expected net savings?