Which of the following systems helps to detect the "abuse of privileges" attack that does not actually involve exploiting any security vulnerability?
Answer : C
Which of the following workforces works to handle the incidents in an enterprise?
Answer : C
You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?
Answer : D
Which of the following actions can be performed by using the principle of separation of duties?
Answer : D
Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?
Answer : C
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
Answer : C
Which of the following measurements of a disaster recovery plan are aimed at detecting unwanted events?
Answer : A