Answers
Answer updated on: 12 Feb 2020
A. Virtual private network A virtual private network (VPN) allows external partners to securely participate in the extranet using public networks as a transport or shared private networks. Because of its low cost, using public networks (Internet) as a transport is the principal method. VPNs rely on tunneling/encapsulation techniques, which allow the Internet Protocol (IP) to carry a variety of ...
Answer updated on: 12 Feb 2020
B. data will not be deleted before that date. A retention date will ensure that a file cannot be overwritten before that date has passed. The retention date will not affect the ability to read the file. Backup copies would be expected to have a different retention date and, therefore, may well be retained after the file has been overwritten. The creation date, not the retention date, will ...
Answer updated on: 12 Feb 2020
C. Web of trust Web of trust is a key distribution method suitable for communication in a small group. It ensures pretty good privacy (PGP) and distributes the public keys of users within a group. Key distribution center is a distribution method suitable for internal communication for a large group within an institution, and it will distribute symmetric keys for each session. Certification ...
Answer updated on: 12 Feb 2020
A. advise senior management of the risk involved. The IS auditors first and foremost responsibility is to advise senior management of the risk involved in having the security administrator perform an operations function. This is a violation of separation of duties. The IS auditor should not get involved in processing.
Answer updated on: 12 Feb 2020
A. authentication of the web site that will be surfed. Authenticating the site to be surfed is the primary goal of a web certificate. Authentication of a user is achieved through passwords and not by a web site certificate. The site certificate does not prevent hacking nor does it authenticate a person.
Answer updated on: 12 Feb 2020
A. has a single authentication point. The primary risk associated with single sign-on is the single authentication point. If a password is compromised, access to many applications can be obtained without further verification. A single point of failure provides a similar redundancy to the single authentication point. However, failure can occur at multiple points in resources, such as data, ...
Answer updated on: 12 Feb 2020
B. Ensuring the integrity of information Maintaining data integrity is the most important objective of data security. This is a necessity if an organization is to continue as a viable and successful enterprise. The other choices are important techniques for achieving the objective of data integrity.
Answer updated on: 12 Feb 2020
B. SSID (service set identifier) broadcasting has been enabled.Disabling SSID broadcasting adds security by making it more difficult for unauthorized users to find the network.In any given scenario, following are the best practises for wireless (wi-fi) security :(a)Enable MAC (Media Access Control) address filtering.(b)Enable Encryption to protect data in transit.
Answer updated on: 12 Feb 2020
A. Network layer In any given scenario, following are the OSI layers at which various firewall operates:
Answer updated on: 12 Feb 2020
A. Visitors are escorted. Escorting visitors will provide the best assurance that visitors have permission to access the data processing facility. Choices B and C are not reliable controls. Choice D is incorrect because visitors should be accompanied at all times while they are on the premises, not only when they are in the data processing facility.
No any questions is under moderation!
Following
You are following 0 people.
Followers
You have 0 followers.
Rank
1st
RankAlfred Hook
139
Asked134
Answered37635
Total Points
2nd
RankOrion Thames
150
Asked146
Answered35233
Total Points
3rd
RankCambron Bill
148
Asked149
Answered35215
Total Points
4th
RankCatherine Halcombe
108
Asked124
Answered23036
Total Points
5th
RankSantepro
600
Asked714
Answered22559
Total Points
6th
RankGregorynaomi
15
Asked14
Answered13608
Total Points
7th
RankRN Pedia
260
Asked167
Answered10271
Total Points
8th
RankAdewumiKoju
3
Asked1
Answered9548
Total Points
9th
RankJaksiboy
24
Asked27
Answered8384
Total Points
10th
RankCripstwick
13
Asked15
Answered8226
Total Points
Load More