Topics
Products
Follow Us:
Sebastiano
Answered: Jul 14, 2020
Whaling

Whaling is the term for targeting the phishing attack to the big fish in the company. With a whaling attack the e-mail message is typically personalized by using the name of that...Read More

1 Answer

210 views
Sebastiano
Answered: Jul 14, 2020
22
443

SSH, which is a secure protocol to replace Telnet, uses port 22, while HTTPS is a secure replacement for HTTP traffic and uses port 443.

1 Answer

210 views
Shellbreiner
Answered: Jul 14, 2020
E-mail programs
Contacts programs
Texting programs

1 Answer

210 views
Sebastiano
Answered: Jul 14, 2020
You have less hardware to secure.

One of the benefits of virtualization is that you need to implement physical security controls on fewer systems because less hardware is used as a result...Read More

1 Answer

210 views
Sebastiano
Answered: Jul 14, 2020
A virus that disguises itself as a legitimate program but actually opens a port on the system

A Trojan virus is a virus that disguises itself as a legitimate program and then when installed...Read More

1 Answer

210 views
Sebastiano
Answered: Jul 14, 2020
To hold employees accountable for any suspicious activity

The security reason to implement mandatory vacation is so that while they are on vacation, you can hopefully detect improper...Read More

1 Answer

210 views
Wyatt Williams
Answered: Jul 14, 2020
Ipconfig

The ipconfig utility can be used to view the TCP/IP configuration on a Windows 2000, Windows XP, Windows Vista, or Windows Server 2003 system. None of these operating systems...Read More

1 Answer

209 views
Wyatt Williams
Answered: Jul 14, 2020
100Base-TX

The 100Base-TX standard specifies twisted-pair UTP cable. Answer B is incorrect because 10Base-FL is a fiber standard and uses fiber-optic cable. There is no standard called...Read More

1 Answer

209 views
Sebastiano
Answered: Jul 14, 2020
Alarm

An alarm is a reporting method that notifies the administrator of a security event and expects immediate action. An alert is a notification that may not require corrective action...Read More

1 Answer

208 views
Wyatt Williams
Answered: Jul 14, 2020
Router

Of the devices listed, only a router operates at the network layer of the OSI model. Answers A and B are incorrect because an AP and a switch are both considered data link layer...Read More

1 Answer

208 views
Sebastiano
Answered: Jul 14, 2020
Driver’s license
Social Security number

Personal Identifiable Information (PII) is unique information about a person that should be protected at all times and kept confidential.

1 Answer

207 views
Wyatt Williams
Answered: Jul 14, 2020
SCP
SFTP

Secure Shell (SSH) technology is used by both Secure Copy Protocol (SCP) and Secure File Transfer Protocol (SFTP). Answer C and D are incorrect because Simple Network...Read More

1 Answer

207 views
Shellbreiner
Answered: Jul 14, 2020
Raid 1

1 Answer

207 views
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.