GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

Author Archives: Anonymous

“Computer workstations must be locked when the workspace is…

“Computer workstations must be locked when the workspace is unoccupied and turned off at the end of the business day.” “Laptops must be either locked with a locking cable or locked in a drawer or filing cabinet.”Which policy includes these directives?

Read Details

Sam is working as a cybersecurity expert. An enterprise that…

Sam is working as a cybersecurity expert. An enterprise that manages nuclear powerplants approached Sam’s company to install an authentication facility for its employees when they access the nuclear plant. The enterprise is demanding multifactor authentication with high security, lowest false acceptance rate, and lowest false rejection rates.Which of the following authentication methods should Sam apply?

Read Details

Which wireless probe is designed to scan and record wireless…

Which wireless probe is designed to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?

Read Details

Which technology under wireless communication is an integrat…

Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate the IoT device?

Read Details

Windows picture password belongs to which of the following?

Windows picture password belongs to which of the following?

Read Details

What does the end-of-service notice indicate?

What does the end-of-service notice indicate?

Read Details

Suzanne is a cybersecurity expert. She was approached by Ale…

Suzanne is a cybersecurity expert. She was approached by Alex with a complaint that his payment information has leaked even though he has not made any online payments or shared information with anyone. Suzanne concluded that attackers most likely bumped a portable reader against Alex’s smartphone to make an NFC connection and steal the payment information stored on the phone.What should Suzanne suggest to Alex to prevent this type of attack from happening in the future?

Read Details

John is instructed by his CEO to introduce an employee atten…

John is instructed by his CEO to introduce an employee attendance system that replaces the current manual-sign register. The system cannot use a power supply and must adhere to COVID-19 protection protocols.What method should John use for this system?

Read Details

In an interview, you were asked to explain the steps involve…

In an interview, you were asked to explain the steps involved in a successful authentication by a RADIUS server. How should you answer?

Read Details

You want to examine every future login attempt made on the e…

You want to examine every future login attempt made on the enterprise devices. Which of the following windows group policy settings should you enable to make sure every login attempt is logged?

Read Details

Posts pagination

Newer posts 1 … 73,847 73,848 73,849 73,850 73,851 … 81,635 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top