Which of the following should be applied in order to achieve confidentiality and integrity of all data across
A new MPLS network link has been established between a company and its business partner. The
link provides logical isolation in order to prevent access from other business partners. Which of the
following should be applied in order to achieve confidentiality and integrity of all data across the
link?
Which of the following authentication services should be replaced with a more secure alternative?
Which of the following authentication services should be replaced with a more secure alternative?
Which of the following activities should be performed by the IT security staff member prior to establishing th
A financial company requires a new private network link with a business partner to cater for realtime and batched data flows. Which of the following activities should be performed by the IT
security staff member prior to establishing the link?
Which of the following BEST describes the email address?
A customer has provided an email address and password to a website as part of the login
process. Which of the following BEST describes the email address?
Which of the following is designed to ensure high availability of web based applications?
Which of the following is designed to ensure high availability of web based applications?
Which of the following would be MOST effective in reducing data leaks in this situation?
After a number of highly publicized and embarrassing customer data leaks as a result of social
engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will
reduce the risk of another data leak. Which of the following would be MOST effective in reducing
data leaks in this situation?
Which of the following provides the BEST level of security training for the executives?
Human Resources (HR) would like executives to undergo only two specific security training
programs a year. Which of the following provides the BEST level of security training for the
executives? (Select TWO).
Which of the following provides data the best fault tolerance at the LOWEST cost?
Which of the following provides data the best fault tolerance at the LOWEST cost?
Which of the following would be the MOST appropriate?
The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the
following would be the MOST appropriate? (Select TWO).
which cannot be reversed and converts data into a string of characters?
Which of the following functions provides an output which cannot be reversed and converts data
into a string of characters?