Which of the following authentication methods prevents unauthorized execution of code on remote systems?
Which of the following authentication methods prevents unauthorized execution of code on remote
systems?
which of the following does SSH provide protection?
Against which of the following does SSH provide protection? Each correct answer represents a
complete solution. Choose two.
Choose all that apply
The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully
integrated system for certification testing and accreditation. What are the process activities of this
phase Each correct answer represents a complete solution. Choose all that apply.
Which of the following Security Control Assessment Tasks evaluates the operational, technical, and the managem
Which of the following Security Control Assessment Tasks evaluates the operational, technical,
and the management security controls of the information system using the techniques and
measures selected or developed
Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operati
Which of the following phases of DITSCAP includes the activities that are necessary for the
continuing operation of an accredited IT system in its computing environment and for addressing
the changing threats that a system faces throughout its life cycle
which of the following layers of the OSI reference model do these routers filter information?
The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packetfiltering firewall and has the capability to filter on some of the contents of packets. On which of the
following layers of the OSI reference model do these routers filter information? Each correct
answer represents a complete solution. Choose all that apply.
What is a stakeholder analysis chart?
What is a stakeholder analysis chart?
You need to secure web services of your company in order to have secure transactions
You work as a Network Administrator for PassGuide Inc. You need to secure web services of your
company in order to have secure transactions. Which of the following will you recommend for
providing security
Which of the following types of encryption does SSL use?
Andrew works as a Network Administrator for Infonet Inc. The company’s network has a Web
server that hosts the company’s Web site. Andrew wants to increase the security of the Web site
by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does
SSL use? Each correct answer represents a complete solution. Choose two.
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is c
Which of the following strategies is used to minimize the effects of a disruptive event on a
company, and is created to prevent interruptions to normal business activity?