Which of the following locations must have a camera in order to provide the minimum level of security for the
You have decided to implement video surveillance in your company in order to enhance network
security. Which of the following locations must have a camera in order to provide the minimum level
of security for the network resources? Each correct answer represents a complete solution. Choose
two.
What will be your answer?
You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign
for your employees. One of the employees of your organization asks you the purpose of the security
awareness, training and education program. What will be your answer?
What is this called?
You are responsible for network and information security at a metropolitan police station. The most
important concern is that unauthorized parties are not able to access data. What is this called?
What will you implement to accomplish this?
You work as a Network Administrator for NetTech Inc. You want to have secure communication on
the company’s intranet. You decide to use public key and private key pairs. What will you implement
to accomplish this?
What is this called?
You are responsible for network and information security at a metropolitan police station. The most
important concern is that unauthorized parties are not able to access data. What is this called?
What component of the change management system is responsible for evaluating, testing, and documenting changes
What component of the change management system is responsible for evaluating, testing, and
documenting changes created to the project scope?
What component of the change management system is responsible for evaluating, testing, and documenting changes
What component of the change management system is responsible for evaluating, testing, and
documenting changes created to the project scope?
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashi
Which of the following protocols is used to compare two values calculated using the Message Digest
(MD5) hashing function?
Which of the following is/are a type of electronic communication?
Electronic communication technology refers to technology devices, such as computers and cell
phones, used to facilitate communication. Which of the following is/are a type of electronic
communication?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a technique used for modifying messages…?
Which of the following is a technique used for modifying messages, providing Information and
Cyber security, and reducing the risk of hacking attacks during communications and message passing
over the Internet?