00:00

QUESTION 1

Which type of attack attempts to gain information by observing the devices power consumption

Correct Answer: B

QUESTION 2

Which of these is WEAKEST form of authentication we can implement?

Correct Answer: A

QUESTION 3

Example of Deterrent controls

Correct Answer: A

QUESTION 4

Which of the following is not a source of redundant power

Correct Answer: D

QUESTION 5

In information systems terms, the activities necessary to restore IT and communications services of an organization during and after an outage

Correct Answer: D