Q: 11
An organization moving its payment card system into a separate location on its network (or security
reasons is an example of network:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Multi-factor authentication (MFA) BEST protects against which of the following attack vectors?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
Cyber threat intelligence is MOST important for:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Management has requested an additional layer of remote access control to protect a critical
database that is hosted online. Which of the following would 8EST provide this protection?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
Which of the following Is a control message associated with the Internet Control Message Protocol
(ICMP)?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Which of the following is the GREATEST risk resulting from a Domain Name System (DNS) cache
poisoning attack?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Which of the following is MOST likely to result from a poorly enforced bring your own device (8YOD)
policy?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Which of the following MOST effectively minimizes the impact of a control failure?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Which of the following is the PRIMARY purpose of load balancers in cloud networking?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2