GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

Your enterprise devices are configured with mandatory access…

Your enterprise devices are configured with mandatory access control. How should you control user access so that files with a “top secret” label cannot be accessed by any users while “secret” files remain accessible?

Read Details

An attacker collected many usernames from a website and trie…

An attacker collected many usernames from a website and tried to login into the accounts using the password “passw0rd”. What type of attack was this?

Read Details

You are a data steward. You have been asked to restrict User…

You are a data steward. You have been asked to restrict User A, who has an access clearance of “top secret” in a MAC-enabled network, from accessing files with the access label “secret.” This, in turn, does not affect any other user.What action should you take?

Read Details

“Keep passwords secure and do not share accounts. Authorized…

“Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts.” “All computers and laptops should be secured with a password-protected screensaver, setting the automatic activation feature set at 10 minutes or less, or logging off when the host is unattended.”Which policy includes these directives?

Read Details

Which of the following can be done to obfuscate sensitive da…

Which of the following can be done to obfuscate sensitive data?

Read Details

Which protocol should John select to prevent unwanted networ…

Which protocol should John select to prevent unwanted network access and be configured to permit traffic only from specific addresses and provide security?

Read Details

Which of the following is an example of evidence collected f…

Which of the following is an example of evidence collected from metadata?

Read Details

Why are mobile devices critical to a digital forensics inves…

Why are mobile devices critical to a digital forensics investigation?

Read Details

Which security protocol encrypts transmissions by using a sh…

Which security protocol encrypts transmissions by using a shared secret key combined with an initialization vector (IV) that changes each time a packet is encrypted?

Read Details

Dave is preparing a COOP for his company. In it, he included…

Dave is preparing a COOP for his company. In it, he included how and where employees and resources will be relocated in case of a natural disaster, how data will be recovered in case a terrorist attack shuts down public networks, and how the company’s critical services and processes will be affected by an IT system failure. Did Dave compile the COOP correctly?

Read Details

Posts pagination

Newer posts 1 … 73,804 73,805 73,806 73,807 73,808 … 81,591 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top