Question 126
Which of the following is a type of computer security that deals with protection against spurious signals emitted by electrical equipment in the system?
Question 127
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service, or unauthorized changes to system hardware, software, or data?
Question 128
A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It
provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to
perform war dialing? Each correct answer represents a complete solution. Choose all that apply.
provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to
perform war dialing? Each correct answer represents a complete solution. Choose all that apply.
Question 129
Which of the following is the process of managing incidents in an enterprise?
Question 130
The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager talks to him about using a differential backup instead and asks him to implement this once a full backup of the data is completed. What is/are the reason(s) Alex is suggesting that James use a differential backup?
(Select all that apply)
(Select all that apply)
