Which of the following best identifies the type of virus that was in your network?
Your network has been hit by a very bad virus recently. As you tracked the virus through the
network, it was changing from system, to system. Each time it went to infect a system; it had
evolved slightly to have a different file size, or different file structure. After extensive work, you and
your team were able to isolate and remove the virus from the network. Which of the following best
identifies the type of virus that was in your network?
Is the Manage layer part of the MOF lifecycle approach?
Is the Manage layer part of the MOF lifecycle approach?
what transport and tunnel modes protect using IPSec?
You are designing a new IPSec implementation for your organization, and are trying to determine
your security needs. You need to clearly understand the implementation choices, before you make
any changes to the network. Which of the following describes what transport and tunnel modes
protect using IPSec?
Which of the following is a best practice concerning information security risk assessment?
Which of the following is a best practice concerning information security risk assessment?
How are these service reports used?
The ISO/IEC 20000 standard requires that a minimum set of service reports is produced. How
are these service reports used?
Which of the following would be examined by a major problem review?
Which of the following would be examined by a major problem review?
1. Things that were done correctly
2. Things that were done incorrectly
3. How to prevent recurrence
4. What could be done better in the future
which of the following commands will identify the operating system of the computer using IP address 192.168.10
You are running some tests in your network, to see if you can remotely identify the operating
system of nodes in the network. Using the nmap tool, which of the following commands will identify
the operating system of the computer using IP address 192.168.10.1?
What do the goals of the Reliability SMF include?
What do the goals of the Reliability SMF include?
which implementation would meet your needs?
If you wish to implement IPSec between two branch offices of your organization, and wish for this
to include the encryption of the full packet, which implementation would meet your needs?
Which action would result from this decision?
A company decides to apply the principle of continual improvement. Which action would result
from this decision?