- (Exam Topic 2)
Which of the following processes identifies the threats that can impact the business continuity of operations?
Correct Answer:C
- (Exam Topic 1)
Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?
Correct Answer:C
- (Exam Topic 2)
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?
Correct Answer:A
- (Exam Topic 2)
Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?
Correct Answer:B
- (Exam Topic 2)
Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.
Correct Answer:AC
- (Exam Topic 2)
You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall. Which of the following firewalls has this feature?
Correct Answer:C