Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?
Answer : C
Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information
Answer : D
Which of the following is not a feature of a cryptographic hash function
Answer : D
A hacker gains access to an organization system without authorization and steal confidential dat
a. What term best describes this ?
Answer : C
DevOps team has updated the application source code, Tom has discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?
Answer : D
Which addresses reserved for internal network use and are not routable on the internet.
Answer : B
Which of the following uses registered port
Answer : D