The primary goal of _________________ risk analysis is to determine the proportion of effect and theoretical r
CORRECT TEXT
Fill in the blank with the appropriate word. The primary goal of _________________ risk analysis
is to determine the proportion of effect and theoretical response.
Which of the following topologies is a type of physical network design where each computer in the network̷
Which of the following topologies is a type of physical network design where each computer in the
network is connected to a central device through an unshielded twisted-pair (UTP) wire?
A _____________ is a technique to authenticate digital documents by using computer cryptography
CORRECT TEXT
Fill in the blank with the appropriate term. A _____________ is a technique to authenticate digital
documents by using computer cryptography.
Which of the following is an intrusion detection system that reads all incoming packets and tries to find susp
Which of the following is an intrusion detection system that reads all incoming packets and tries to
find suspicious patterns known as signatures or rules?
The_______________ is typically considered as the top InfoSec officer in the organization and helps in maintai
CORRECT TEXT
Fill in the blank with the appropriate term. The_______________ is typically considered as the top
InfoSec officer in the organization and helps in maintaining current and appropriate body of
knowledge required to perform InfoSec management functions.
which of the following types of port scans does the scanner attempt to connect to all 65,535 ports?
In which of the following types of port scans does the scanner attempt to connect to all 65,535
ports?
Which of the following is a firewall that keeps track of the state of network connections traveling across it?
Which of the following is a firewall that keeps track of the state of network connections traveling
across it?
It is also known as public key encryption
CORRECT TEXT
Fill in the blank with the appropriate term. ______________ encryption is a type of encryption that
uses two keys, i.e., a public key and a private key pair for data encryption. It is also known as
public key encryption.
______________is a protocol used to synchronize the timekeeping among the number of distributed time servers a
CORRECT TEXT
Fill in the blank with the appropriate term. ______________is a protocol used to synchronize the
timekeeping among the number of distributed time servers and clients.
The ______________is a communication protocol that communicates information between the network routers and th
CORRECT TEXT
Fill in the blank with the appropriate term.The ______________is a communication protocol that
communicates information between the network routers and the multicast end stations.