Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Question 1
use a two-factor authentication to authenticate the source of the data back up the data to an
offsite location
Question 2
What is a countermeasure that an organization can employ to improve the confidentiality of data
that is transmitted by users and devices?
Question 3
Which three are considered personally identifiable information (PII) data? (Choose three.)
Question 4
a new unconfigured router that is not connected to the network an old hard
drive that is about to be scrapped
Question 5
What type of information does CVSS provide for a vulnerability?
Question 6
What type of access control model is used to set up multiple accounts with different access
levels on a system?
Question 7
In addition to discretionary, non-discretionary, and mandatory access control, which two should
be part of an organization's access security plan? (Choose two.)
Question 8
Question 9
Question 10
Question 11
Question 12
The SOC is usually responsible for monitoring and maintaining the overall network infrastructure
—its primary function is to ensure uninterrupted network service.
A SOC is related to the people, processes, and technologies that are involved in providing
situational awareness through the detection, containment, and remediation of information
security threats.
The SOC is responsible for the physical security of a building or installation location.
The SOC and NOC are the same entity, with different names. They are responsible for the health
and security of the network infrastructure.