Question No : 1
In public key cryptography, digital signatures are primarily used to;
정답:
Question No : 2
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
정답:
Question No : 3
Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?
정답:
Question No : 4
Which of the following is MOST important to ensure the successful implementation of continuous auditing?
정답:
Question No : 5
Which of the following is the SLOWEST method of restoring data from backup media?
정답:
Question No : 6
What is the MAIN consideration when storing backup files?
정답:
Question No : 7
When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?
정답:
Question No : 8
Which of the following BEST facilitates the development of metrics for repotting to senior management on vulnerability management efforts?
정답:
Question No : 9
What is the FIRST activity associated with a successful cyber attack?
정답:
Question No : 10
Using digital evidence to provide validation that an attack has actually occurred is an example of;
정답:
Question No : 11
Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?
정답:
Question No : 12
Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
정답:
Question No : 13
he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:
정답:
Question No : 14
Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?
정답:
Question No : 15
Which type of tools look for anomalies in user behavior?
정답: