A way to assure data at-rest is secure even in the event of loss or theft is to usE.

Correct Answer for the Question – A way to assure data at-rest is secure even in the event of loss or theft is to usE. is given below A way to assure data at-rest is secure even in the event of loss or theft is to usE. full device encryption. special permissions on the file system. … Read more

Which of the following would allow the organization to divide a Class C IP address range into several ranges?

Correct Answer for the Question – Which of the following would allow the organization to divide a Class C IP address range into several ranges? is given below Which of the following would allow the organization to divide a Class C IP address range into several ranges? DMZ Virtual LANs NAT Subnetting Correct Answer The Correct … Read more

Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network?

Correct Answer for the Question – Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network? is given below Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network? Cross-platform compatibility issues between personal devices and … Read more

Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN?

Correct Answer for the Question – Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN? is given below Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN? WPA2 CCMP WPA WPA with MAC filtering WPA2 TKIP Correct Answer … Read more

Which of the following solutions provides the most flexibility when testing new security controls prior to implementation?

Correct Answer for the Question – Which of the following solutions provides the most flexibility when testing new security controls prior to implementation? is given below Which of the following solutions provides the most flexibility when testing new security controls prior to implementation? Trusted OS Host software baselining OS hardening Virtualization Correct Answer The Correct Answer … Read more

Deploying a wildcard certificate is one strategy to:

Correct Answer for the Question – Deploying a wildcard certificate is one strategy to: is given below Deploying a wildcard certificate is one strategy to: secure the certificate’s private key. increase the certificate’s encryption key length. extend the renewal date of the certificate. reduce the certificate management burden. Correct Answer The Correct Answer for this Question … Read more

When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength?

Correct Answer for the Question – When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength? is given below When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength? SHA … Read more

Which of the following is the GREATEST security risk of two or more companies working together under a Memorandum of Understanding?

Correct Answer for the Question – Which of the following is the GREATEST security risk of two or more companies working together under a Memorandum of Understanding? is given below Which of the following is the GREATEST security risk of two or more companies working together under a Memorandum of Understanding? Budgetary considerations may not have … Read more

Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?

Correct Answer for the Question – Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host? is given below Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host? Installing … Read more

Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?

Correct Answer for the Question – Which of the following functions provides an output which cannot be reversed and converts data into a string of characters? is given below Which of the following functions provides an output which cannot be reversed and converts data into a string of characters? Hashing Stream ciphers Steganography Block ciphers Correct … Read more