Question
No:1
A customer has provided an email
address and password to a website as part of the login process.Which of the
following BEST describes the email address?
A. Identification
B. Authorization
C. Access control
D. Authentication
Answer: A
Question
No:2
After a recent security breach, the
network administrator has been tasked to update and backup all router and
switch configurations.The security administrator has been tasked to enforce
stricter security policies. All users were forced to undergo additional user
awareness training.All of these actions are due to which of the following types
of risk mitigation strategies?
A. Change management
B. Implementing policies
to prevent data loss
C. User rights and
permissions review
D. Lessons learned
No comments:
Post a Comment