Which of the following technologies will you implement to accomplish the task?
You work as a technician for Trade Well Inc. The company is in the business of share trading. To
enhance security, the company wants users to provide a third key (apart from ID and password) to
access the company’s Web site. Which of the following technologies will you implement to
accomplish the task?
Which of the following encryption modes can make protocols without integrity protection…?
Which of the following encryption modes can make protocols without integrity protection even
more susceptible to replay attacks, since each block gets decrypted in exactly the same way?
Which of the following are Change Management terminologies?
The goal of Change Management is to ensure that standardized methods and procedures are used
for efficient handling of all changes. Which of the following are Change Management terminologies?
Each correct answer represents a part of the solution. Choose three.
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP
model?
Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?
Which of the following is the correct order of digital investigations Standard Operating Procedure
(SOP)?
Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?
Which of the following is the correct order of digital investigations Standard Operating Procedure
(SOP)?
What is the most cost effective method to prevent this?
You are the Network Administrator for a college. You watch a large number of people (some not
even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You
have had a problem with laptops being stolen. What is the most cost effective method to prevent
this?
Which of the following roles is used to ensure that the confidentiality, integrity…?
Which of the following roles is used to ensure that the confidentiality, integrity, and availability of
the services are maintained to the levels approved on the Service Level Agreement (SLA)?
which of the following maturity levels of software CMM focuses on the continuous process improvement?
James works as a security manager for SoftTech Inc. He has been working on the continuous process
improvement and on the ordinal scale for measuring the maturity of the organization involved in the
software processes. According to James, which of the following maturity levels of software CMM
focuses on the continuous process improvement?
Which of the following roles is used to ensure that the confidentiality, integrity…?
Which of the following roles is used to ensure that the confidentiality, integrity, and availability of
the services are maintained to the levels approved on the Service Level Agreement (SLA)?