Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
Correct Answer:
C
In which of the following access control models, owner of an object decides who is allowed to access the object and what privileges they have?
Correct Answer:
D
John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?
Correct Answer:
C
Which of the following protocols uses public-key cryptography to authenticate the remote computer?
Correct Answer:
A
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Correct Answer:
B