What will you do to accomplish this?

You work as a Network Administrator for Infonet Inc. The company’s network has an FTP server. You want tosecure the server so that only authorized users can access it. What will you do to accomplish this? A. Disable anonymous authentication. B. Stop the FTP service on the server. C. Disable the network adapter on the […]

Read More

Which of the following statements about a perimeter network are true?

Which of the following statements about a perimeter network are true? (Choose three) A. It has a connection to the Internet through an external firewall and a connection to an internal network through an interior firewall. B. It has a connection to a private network through an external firewall and a connection to an internal […]

Read More

Which of the following are the goals of risk management?

Which of the following are the goals of risk management? (Choose three) A. Identifying the risk B. Assessing the impact of potential threats C. Finding an economic balance between the impact of the risk and the cost of the countermeasure D. Identifying the accused Explanation:There are three goals of risk management as follows: Identifying the […]

Read More

Which of the following mechanisms is closely related to authorization?

Which of the following mechanisms is closely related to authorization? A. Sending secret data such as credit card information. B. Allowing access to a particular resource. C. Verifying username and password. D. Sending data so that no one can alter it on the way. Explanation:Authorization is a process that verifies whether a user has permission […]

Read More

Which of the following tasks need to be performed by the auditor manually?

An auditor assesses the database environment before beginning the audit. This includes various key tasks thatshould be performed by an auditor to identify and prioritize the users, data, activities, and applications to bemonitored. Which of the following tasks need to be performed by the auditor manually? A. Classifying data risk within the database systems B. […]

Read More