Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?
#31
Answer: D✅ Correct❌ Incorrect
Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?
#32
Answer: A✅ Correct❌ Incorrect
Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?
#33
Answer: A✅ Correct❌ Incorrect
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
#34
Answer: C✅ Correct❌ Incorrect
An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user's certificate. Which of the following processes fulfills the above requirements?
#35
Answer: A✅ Correct❌ Incorrect
Which of the following is the name of an individual or group that is impacted by a change?
#36
Answer: C✅ Correct❌ Incorrect
The European Union (EU) General Data Protection Regulation (GDPR) requires organizations to implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk. The Data Owner should therefore consider which of the following requirements?
#37
Answer: B✅ Correct❌ Incorrect
What is the PRIMARY benefit of incident reporting and computer crime investigations?
#38
Answer: B✅ Correct❌ Incorrect
Which of the following is the MOST common method of memory protection?
#39
Answer: C✅ Correct❌ Incorrect
What testing technique enables the designer to develop mitigation strategies for potential vulnerabilities?
#40
Answer: B✅ Correct❌ Incorrect
You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?
#41
Answer: B✅ Correct❌ Incorrect
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead- space?
#42
Answer: A✅ Correct❌ Incorrect
Which of the following refers to a location away from the computer center where document copies and backup media are kept?
#43
Answer: B✅ Correct❌ Incorrect
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?
#44
Answer: D✅ Correct❌ Incorrect
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
#45
Answer: B✅ Correct❌ Incorrect
Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?
#46
Answer: D✅ Correct❌ Incorrect
IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption. Which of the following encryption methods does IPsec VPN use? Each correct answer represents a complete solution. Choose two.
#47
Answer: CD✅ Correct❌ Incorrect
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?
#48
Answer: A✅ Correct❌ Incorrect
Which of the following types of firewall functions at the Session layer of OSI model?
#49
Answer: A✅ Correct❌ Incorrect
Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.
#50
Answer: D✅ Correct❌ Incorrect
Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?
#51
Answer: D✅ Correct❌ Incorrect
You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?
#52
Answer: B✅ Correct❌ Incorrect
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
#53
Answer: A✅ Correct❌ Incorrect
Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?
#54
Answer: D✅ Correct❌ Incorrect
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a
128 bit hash value. Which of the following should you use?
#55
Answer: C✅ Correct❌ Incorrect
You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?
#56
Answer: C✅ Correct❌ Incorrect
Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.
#57
Answer: ABD✅ Correct❌ Incorrect
You work as a Senior Marketing Manger for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning.
The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident. Which of the following steps of an incident handling process was performed by the incident response team?
#58
Answer: D✅ Correct❌ Incorrect
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
#59
Answer: A✅ Correct❌ Incorrect
Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation? Each correct answer represents a complete solution. Choose all that apply.