Question 1

Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:
a) Assess the potential impact of the threat on the organization
b) Estimate the probability of occurrence of each threat
c) Assess the internal and external resources available to mitigate the identified threats d) List the threats that may occur In which order should Jon implement these steps?
  • Question 2

    Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:
    * It has a parity check to store all the information about the data in multiple drives.
    * Help reconstruct the data during downtime.
    * Process the data at a good speed.
    * Should not be expensive.The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?
  • Question 3

    You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?
  • Question 4

    Which of the following server categories stores the information about host accounts and implements security policies in its particular domain?
  • Question 5

    Which of the following terms refers to third-party backup, and offsite replication?