Question 146
Which of the following policies is used to add additional information about the overall security posture and serves to protect employees and organizations from inefficiency or ambiguity?
Question 147
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
Question 148
Stephanie is currently setting up email security so all company data is secured when passed through email.
Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?
Question 149
A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It
provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to
perform war dialing? Each correct answer represents a complete solution. Choose all that apply.
Question 150
Which of the following are the valid steps for securing routers? Each correct answer represents a complete solution. Choose all that apply.