Which of the following can be prevented by an organization using job rotation and separation of duties policie
Which of the following can be prevented by an organization using job rotation and separation of
duties policies?
which of the following layers of the OSI reference model do these routers filter information?
The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packetfiltering firewall and has the capability to filter on some of the contents of packets. On which of the
following layers of the OSI reference model do these routers filter information? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following can be prevented by an organization using job rotation and separation of duties policie
Which of the following can be prevented by an organization using job rotation and separation of
duties policies?
Which of the following data should be recorded in this documentation?
Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to
conduct a seminar to give necessary information related to sexual harassment within the work place.
Peter started with the definition and types of sexual harassment. He then wants to convey that it is
important that records of the sexual harassment incidents should be maintained, which helps in
further legal prosecution. Which of the following data should be recorded in this documentation?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of encryption does SSL use?
Andrew works as a Network Administrator for Infonet Inc. The company’s network has a Web server
that hosts the company’s Web site. Andrew wants to increase the security of the Web site by
implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?
Each correct answer represents a complete solution. Choose two.
Which of the following types of evidence is considered as the best evidence?
Which of the following types of evidence is considered as the best evidence?
Which of the following types of evidence is considered as the best evidence?
Which of the following types of evidence is considered as the best evidence?
Which of the following cryptographic algorithms is being used by the Weare-secure server?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security
of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe-middle attack since the key exchange process of the cryptographic algorithm it is using does not
thenticate participants. Which of the following cryptographic algorithms is being used by the Weare-secure server?
What are the purposes of audit records on an information system?
What are the purposes of audit records on an information system?
Each correct answer represents a complete solution. Choose two.
Which of the following will she use to accomplish the task?
Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the
presentation. Which of the following will she use to accomplish the task?