Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
Correct Answer:B
https://en.wikipedia.org/wiki/Security_information_and_event_management
Which type of facility is enabled by a contract with an alternative data processing facility which willprovide HVAC, power and communicationsinfrastructure as well computing hardware and a duplication of organisations existing "live" data?
Correct Answer:A
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Correct Answer:D
Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmitcredit card data?
Correct Answer:A
https://digitalguardian.com/blog/what-pci-compliance
Which cryptographic protocol preceded Transport Layer Security (TLS)?
Correct Answer:C