Q1. Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet. Accidentally, a malicious file was downloaded onto Sarah's computer without her knowledge. This download might be due to the free Internet access and the absence of network defense solutions. Identify the Internet access policy demonstrated in the above scenario.
A.Permissive policy
B. Promiscuous policy
C. Paranoid policy
D. Prudent policy
Correct Answer: A
Q2. John is working as a security professional in FinCorp Ltd. He was instructed to deploy a security solution on their corporate network that provides real-time monitoring, correlation of events, threat detection, and security incident response activities. Which of the following security solutions helps John in the above scenario?
A.SIEM
B. VPN
C. SOCKS
D. MDM
Correct Answer: A
Q3. Which of the following access control models refers to assigning permissions to a user role based on the rules defined for each user role by the administrator?
A.Discretionary rule access control
B. Mandatory rule access control
C. Rule-based access control
D. Role-based access control
Correct Answer: D
Q4. John is working as a security professional in FinCorp Ltd. He was instructed to deploy a security solution on their corporate network that provides real-time monitoring, correlation of events, threat detection, and security incident response activities. Which of the following security solutions helps John in the above scenario?
A.SIEM
B. VPN
C. SOCKS
D. MDM
Correct Answer: A
$ 39
Reviews
There are no reviews yet.