Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?Each correct answer represents a complete solution. Choose all that apply.
NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want to the information security policies.Which of the following are its significant steps?Each correct answer represents a complete solution. Choose two.
You are a Consumer Support Technician. You are helping a user troubleshoot computer-related issues. While troubleshooting the user's computer, you find a malicious program similar to a virus or worm. The program negatively affects the privacy and security of the computer and is capable of damaging the computer. Which of the following alert levels of Windows Defender is set for this program?
You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?
Which of the following types of attacks cannot be prevented by technical measures only?
Which of the following statements about digital signature is true?