Q: 11
The risk of an evil twin attack on mobile devices is PRIMARILY due to:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Which of the following is a feature of a stateful inspection firewall?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
When passwords are tied into key generation, the strength of the encryption algorithm is:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
At which layer in the open systems interconnection (OSI) model does SSH operate?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
The discovery of known dangerous artifacts on a network such as IP addresses or domain names
helps to identify which of the following?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an
example of managing:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Which of the following describes specific, mandatory controls or rules to support and comply with a
policy?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
A cloud service provider is used to perform analytics on an organization's sensitive dat
a. A data leakage incident occurs in the service providers network from a regulatory perspective, who
is responsible for the data breach?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Which of the following is a known potential risk of using a software defined perimeter (SDP)
controller?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2