Questions
- Frederick automatically backs up his smartphone on the cloud. Which of the following does this represent?
A. Safety
B. Integrity
C. Availability
D. Confidentiality
- Beth is an auditor determining which department and systems to examine for an audit. She also needs details about which processes to monitor. This is an example of which phase of the audit?
A. Executing exploits
B. Running reconnaissance
C. Defining the scope
D. Conducting documentation
- The security approach of complete mediation provides which feature?
A. A security design where a kernel protects the hardware
B. A security design where all access is verified
C. A security design that preserves data integrity
D. A security design using defense in depth
- The device that resides on system motherboards to manage encryption and passwords is called what?
A. HSM
B. TCG
C. MBR
D. TPM
- What communication connectors provide the BEST defense and security for leaked authentication vulnerabilities?
A. RJ-45
B. SC
C. BNC...