View Mode
Q: 11
The risk of an evil twin attack on mobile devices is PRIMARILY due to:
Options
Q: 12
Which of the following is a feature of a stateful inspection firewall?
Options
Q: 13
When passwords are tied into key generation, the strength of the encryption algorithm is:
Options
Q: 14
At which layer in the open systems interconnection (OSI) model does SSH operate?
Options
Q: 15
The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?
Options
Q: 16
Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:
Options
Q: 17
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?
Options
Q: 18
A cloud service provider is used to perform analytics on an organization's sensitive dat a. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?
Options
Q: 19
Which of the following is a known potential risk of using a software defined perimeter (SDP) controller?
Options
Q: 20
Which of the following is the MOST important step to determine the risks posed to an organization by social media?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE