0 Comments

Question 1. All of the following are advantages of a defense­in­depth security design except which one?

a. Defense in depth avoids single points of failure.

b.defense in-depth keeps senior management out of the activities of the security department.

c.Defense in depth divides and conquers, which separates projects into smaller pieces.

d.Defense in depth filters user interactions.

Question 2.Gathering through eavesdropping on communications, whether encrypted or not,is known as what?

a.Encryption

b.Traffic and trend analysis

c RAID

d.Filtering

Question 3.What attack cracks a password or encryption key by trying all possible valid combinations?

a.Brute­force attack

b.Dictionary password attack

c.Modeling

Contact chat support/Whatsapp chat to get a solution for the above question.

Order Solution Now

Categories: