Question 1. All of the following are advantages of a defenseindepth security design except which one?
a. Defense in depth avoids single points of failure.
b.defense in-depth keeps senior management out of the activities of the security department.
c.Defense in depth divides and conquers, which separates projects into smaller pieces.
d.Defense in depth filters user interactions.
Question 2.Gathering through eavesdropping on communications, whether encrypted or not,is known as what?
a.Encryption
b.Traffic and trend analysis
c RAID
d.Filtering
Question 3.What attack cracks a password or encryption key by trying all possible valid combinations?
a.Bruteforce attack
b.Dictionary password attack
c.Modeling
Contact chat support/Whatsapp chat to get a solution for the above question.
