Mark works as a security manager for SofTech Inc. He is working in a partially equipped office space which contains some of the system hardware, software, telecommunications, and power sources. In which of the following types of office sites is he working?
Answer : B
You work as a Forensic Investigator. Which of the following rules will you follow while working on a case? Each correct answer represents a part of the solution. Choose all that apply.
Answer : A, B, C, D
A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?
Answer : C
Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?
Answer : B
Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?
Answer : A
Which of the following is the default port for Secure Shell (SSH)?
Answer : B
Which of the following is the best method to stop vulnerability attacks on a Web server?
Answer : D