- (Exam Topic 2)
Creating a secondary authentication process for network access would be an example of?
Correct Answer:
C
- (Exam Topic 3)
Which of the following is a major benefit of applying risk levels?
Correct Answer:
B
- (Exam Topic 4)
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
Correct Answer:
C
- (Exam Topic 2)
In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?
Correct Answer:
C
- (Exam Topic 5)
A digital signature addresses which of the following concerns?
Correct Answer:
A
Reference: https://www.entrust.com/resources/certificate-solutions/learn/digital-signatures