Which of the following is a component of a risk assessment?
Correct Answer:
A
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
Correct Answer:
A
An LDAP directory can be used to store information similar to a SQL database. LDAP uses a database structure instead of SQL’s ______ structure. Because of this, LDAP has difficulty representing many-to-one relationships.
Correct Answer:
C
Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days. Bob denies that he had ever sent a mail. What do you want to ""know"" to prove yourself that it was Bob who had send a mail?
Correct Answer:
D
Which of these is capable of searching for and locating rogue access points?
Correct Answer:
C