Harry has successfully completed the vulnerability scanning process and found serious vulnerabilities exist in the organization's network. Identify the vulnerability management phases through which he will proceed to ensure all the detected vulnerabilities are addressed and eradicated. (Select all that apply)
Correct Answer:ACD
Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. What is the last step he should list?
Correct Answer:D
Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any one of the main nodes fail?
Correct Answer:C
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a _______ identified which helps measure how risky an activity is.
Correct Answer:C
------------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)
Correct Answer:B