which of the following disaster recovery tests can this task be performed?
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you
want to discuss it with your team members for getting appropriate responses of the disaster. In
which of the following disaster recovery tests can this task be performed?
Which of the following are the likely reasons for the clustering?
You are responsible for a Microsoft based network. Your servers are all clustered. Which of the
following are the likely reasons for the clustering?
Each correct answer represents a complete solution. Choose two.
Which of the following are the phases of the Certification and Accreditation (C&A) process?
Which of the following are the phases of the Certification and Accreditation (C&A) process?
Each correct answer represents a complete solution. Choose two.
Which of the following is the most secure method of authentication?
Which of the following is the most secure method of authentication?
Which of the following processes fulfills the above requirements?
An organization wants to allow a certificate authority to gain access to the encrypted data and
create digital signatures on behalf of the user. The data is encrypted using the public key from a
user’s certificate. Which of the following processes fulfills the above requirements?
Which of the following are the primary components of a discretionary access control (DAC) model?
Which of the following are the primary components of a discretionary access control (DAC) model?
Each correct answer represents a complete solution. Choose two.
Which of the following technologies will you implement to accomplish the task?
You work as a technician for Trade Well Inc. The company is in the business of share trading. To
enhance security, the company wants users to provide a third key (apart from ID and password) to
access the company’s Web site. Which of the following technologies will you implement to
accomplish the task?
Which of the following encryption modes can make protocols without integrity protection…?
Which of the following encryption modes can make protocols without integrity protection even
more susceptible to replay attacks, since each block gets decrypted in exactly the same way?
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP
model?
What is the most cost effective method to prevent this?
You are the Network Administrator for a college. You watch a large number of people (some not
even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You
have had a problem with laptops being stolen. What is the most cost effective method to prevent
this?