Sienna works as a receptionist in an enterprise. One day, she saw a suspicious person wandering around the reception area. What should she do first?

She should shout at him so that everyone will notice that he shouldn't be there.

She should interact with him appropriately so that he knows he is being observed.

She should immediately call security or the police.

She should physically intercept or impede him.

You are working as a cybersecurity administrator for your country's government. You are asked to block certain websites in your country deemed critical of those in power. Which of the following methods should you use?

DDoS

DNS poisoning

Session replay

MITM

You submitted a network security review report for your organization. After an inspection, the report was returned for corrections with comments from the organizational head. The review report you sent was a pdf file, whereas the returned report was a Microsoft Word file. Word warns you that the file might not be safe to open. Which of the following actions should you take to prevent a possible macros attack?

Designate the file as a trusted document

Move the file to a trusted location

Delete the file permanently

Open the file in protected view

In an interview, you are asked about the objective of Microsoft Office's protected view function. Which of the following should be your answer?

To protect your eyes from blue light strain

To protect your devices from physical damage

To protect your files from unauthorized access

To protect your devices from infections

What is a session ID?

A session ID is a unique number that a web server assigns to a specific user for the duration of the user's visit.

A session ID is a unique number that an administrator assigns to a specific user for the duration of the user's visit.

A session ID is a unique number that an ISP assigns to a specific user for the duration of the user's visit.

A session ID is a unique number that a web browser assigns to a specific user for the duration of the user's visit.

You are asked to create a certificate signing request for a website that your organization recently developed. Which of the following tools should you use?

OpenSSL

theHarvester

nslookup

dnsenum

Which of the following best describes two-person integrity control?

Assigning two individuals as the head of the organization

Assigning two administrators to a single server

Allowing only two people to access specific resources at one time

Assigning two security guards to protect the building

Which of the following tools has a graphical user interface (GUI)?

Wireshark

Ping

Tcpdump

Traceroute

ou are a security expert asked to install physical security equipment in your enterprise. This device should ensure that employee devices are protected from unauthorized access when they are away. Which equipment should you install?

Faraday cage

Protected cable distribution

Vaults

Bollards

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!