Which of the following policy forbids everything with strict restrictions on all usage of the company systems and network?
Correct Answer:B
One of the steps in information gathering is to run searches on a company using complex keywords in Google.
Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?
Correct Answer:C
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?
Correct Answer:B
Which one of the following acts makes reputational risk of poor security a reality because it requires public disclosure of any security breach that involves personal information if it is unencrypted or if it is reasonably believed that the information has been acquired by an unauthorized person?
Correct Answer:A
What is kept in the following directory? HKLMSECURITYPolicySecrets
Correct Answer:A