00:00

QUESTION 26

The DLP solution should be deployed so that it can inspect all forms of data leaving the organization, including:

Correct Answer: D

QUESTION 27

DDOS attack affect which OSI layer

Correct Answer: D

QUESTION 28

Also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs)

Correct Answer: A

QUESTION 29

What is a threat in the context of cybersecurity

Correct Answer: D

QUESTION 30

Which is the component of a Business Continuity (BC) plan

Correct Answer: D