Question 126

Which of the following is a type of computer security that deals with protection against spurious signals emitted by electrical equipment in the system?
  • Question 127

    Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service, or unauthorized changes to system hardware, software, or data?
  • Question 128

    A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It
    provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to
    perform war dialing? Each correct answer represents a complete solution. Choose all that apply.
  • Question 129

    Which of the following is the process of managing incidents in an enterprise?
  • Question 130

    The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager talks to him about using a differential backup instead and asks him to implement this once a full backup of the data is completed. What is/are the reason(s) Alex is suggesting that James use a differential backup?
    (Select all that apply)