QUESTION: 9
Which of the following means of wireless authentication is easily vulnerable to spoofing?
A. MAC Filtering
B. WPA – LEAP
C. WPA – PEAP
D. Enabled SSID
Answer : A
Monday, 8 August 2016
Wednesday, 20 July 2016
SY0-401 Sample Question : 8
QUESTION: 8
Which of the following is being tested when a company’s payroll server is powered off for eight hours?
A. Succession plan
B. Business impact document
C. Continuity of operations plan
D. Risk assessment plan
Answer : C
Which of the following is being tested when a company’s payroll server is powered off for eight hours?
A. Succession plan
B. Business impact document
C. Continuity of operations plan
D. Risk assessment plan
Answer : C
Tuesday, 28 June 2016
SY0-401 Sample Question : 7
QUESTION: 7
Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks?
A. Intrusion Detection System
B. Flood Guard Protection
C. Web Application Firewall
D. URL Content Filter
Answer : C
Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks?
A. Intrusion Detection System
B. Flood Guard Protection
C. Web Application Firewall
D. URL Content Filter
Answer : C
Tuesday, 17 May 2016
Staff training as important as tech in cybercrime fight - CompTIA
Organization says that distributors must focus on training and technology to customersCompTIA said that 70 percent of UK businesses have suffered a security breach in the last year, with a little face of an attack almost once a month. About 60 percent of these companies, said human error was to blame for rape, claiming CompTIA underlines the urgent need for staff trained to avoid such problems.
The survey attributed the general negligence of staff, made up of new threats, and general lack of experience in the field of security that some of the most important problems that retain workers.
With this in mind, CompTIA CyberSecure launches its education program, which is designed to provide a "basic understanding" of cyber security for staff in all areas of organizations.
Vice President CompTIA Skills and education for Graham Hunter EMEA said it represents an opportunity for the channel.
"We're freely available to our channel partners and will have 50 licenses," he said. "We have made a commitment and is to get out there on the market today. This is to raise the level of knowledge of information security in an organization.
"You could say that these [channel] organizations themselves need to go through a certain level of awareness training, as can often be the guardians of important data by the nature of services they provide. If they do not protect Also their staff, which could be an easy way. "
Hunter said he hopes programs like CyberSecure reached the general public in the departments of the company in the same way the training packages HR other businesses.
Richard Beck, computer training cybersecurity chief of staff, according to GC and said he's working team of security is important.
"The best technology in the world will not protect against the actions of an employee, volunteer or an innocent mistake, opening the door to an attack," he said. "With regard to cybersecurity, companies often take the first technology, and training is behind in second place. However, you must use both the same extent."
Monday, 18 April 2016
SY0-401 Sample Question : 6
QUESTION : 6
A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer will have very different job requirements and use unique tools and applications in their job. Which of the following is MOST appropriate to use?
A. Role-based privileges
B. Credential management
C. User assigned privileges
D. User access
Correct Answer: A
A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer will have very different job requirements and use unique tools and applications in their job. Which of the following is MOST appropriate to use?
A. Role-based privileges
B. Credential management
C. User assigned privileges
D. User access
Correct Answer: A
Subscribe to:
Comments (Atom)