How is access control permissions established in the RBAC access control model?
How is access control permissions established in the RBAC access control model?
Which of the following can help an administrator to implement a procedure to control inbound and outbound traf
Which of the following can help an administrator to implement a procedure to control inbound and
outbound traffic on a network segment?
Which access control model uses Access Control Lists to identify the users who have permissions to a resource?
Which access control model uses Access Control Lists to identify the users who have permissions
to a resource?
Which item will be used by the technician?
A company wants to monitor all network traffic as it traverses their network. Which item will be
used by the technician?
What is steganography primarily used for?
What is steganography primarily used for?
Which port number will secure LDAP use by default?
The Lightweight Directory Access Protocol or LDAP is an application protocol for querying and
modifying directory services running over TCP/IP. A user needs to implement secure LDAP on the
network. Which port number will secure LDAP use by default?
Which of the following should be used when sending the email?
A user has a sensitive message that needs to be sent in via email. The message needs to be
protected from interception. Which of the following should be used when sending the email?
Which intrusion detection system will use well defined models of how an attack occurs?
Which intrusion detection system will use well defined models of how an attack occurs?
Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended
Which of the following refers to the ability to be reasonably certain that data is not disclosed to
unintended persons?
Which of the following BEST describes this type of certificate?
While surfing the Internet a user encounters a pop-up window that prompts the user to download a
browser plug-in. The pop-up window is a certificate which validates the identity of the plug-in
developer. Which of the following BEST describes this type of certificate?