Which type of attack attempts to gain information by observing the devices power consumption
Correct Answer:
B
Which of these is WEAKEST form of authentication we can implement?
Correct Answer:
A
Example of Deterrent controls
Correct Answer:
A
Which of the following is not a source of redundant power
Correct Answer:
D
In information systems terms, the activities necessary to restore IT and communications services of an organization during and after an outage
Correct Answer:
D