Question 7

Which of the information below can be gained through network sniffing? (Select all that apply)

Correct Answer:ABC

Question 8

Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?

Correct Answer:C

Question 9

A company has the right to monitor the activities of their employees on different information systems according to the _______ policy.

Correct Answer:B

Question 10

Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. What is the last step he should list?

Correct Answer:C

Question 11

Chris is a senior network administrator. Chris wants to measure the Key Risk Indicator (KRI) to assess the organization. Why is Chris calculating the KRI for his organization? It helps Chris to:

Correct Answer:AD

Question 12

Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?

Correct Answer:C

START 312-38 EXAM