How does the Address Resolution Protocol (ARP) work?
How does the Address Resolution Protocol (ARP) work?A . It sends a reply packet for a specific IP, asking for the MAC address.B . It sends a reply packet to all the network elements,...
How does the Address Resolution Protocol (ARP) work?A . It sends a reply packet for a specific IP, asking for the MAC address.B . It sends a reply packet to all the network elements,...
Which of the following is the greatest threat posed by backups?A . An un-encrypted backup can be misplaced or stolenB . A back is incomplete because no verification was performed.C . A backup is...
Which of the following types of firewalls ensures that the packets are part of the established session?A . Switch-level firewallB . Stateful inspection firewallC . Application-level firewallD . Circuit-level firewallView AnswerAnswer: B
Which of these options is the most secure procedure for strong backup tapes?A . In a climate controlled facility offsiteB . Inside the data center for faster retrieval in afire proof safeC . In...
During a security audit of IT processes, an IS auditor found that there was no documented security procedures. What should the IS auditor do?A . Terminate the audit.B . Identify and evaluate existing practices.C...
Risk = Threats x Vulnerabilities is referred to as the:A . Threat assessmentB . Disaster recovery formulaC . BIA equationD . Risk equationView AnswerAnswer: D
It is a short-range wireless communication technology intended to replace the cables connecting portables of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and...
What does a firewall check to prevent particular ports and applications from getting packets into an organizations?A . Transport layer port numbers and application layer headersB . Network layer headers and the session layer...
What is the process of logging, recording, and resolving events that take place in an organization?A . MetricsB . Security PolicyC . Internal ProcedureD . Incident Management ProcessView AnswerAnswer: D
An attacker changes the profile information of a particular user on a target website (the victim). The attacker uses this string to update the victim's profile to a text file and then submit the...