Which of the following attacks can be mitigated by proper data retention policies?

Which of the following attacks can be mitigated by proper data retention policies?
A.   Dumpster diving
B.   Man-in-the-browser
C.   Spear phishing
D.   Watering hole

A security administrator needs to conduct a full inventory of all encryption protocols and cipher suites. Which of the following tools will the security administrator use to conduct this inventory MOST efficiently?
A.   Tcpdump
B.   Protocol analyzer
C.   Netstat
D.   Nmap

Don't use plagiarized sources. Get Your Custom Essay on
Which of the following attacks can be mitigated by proper data retention policies?
Just from $8 /Page 0r 300 words
Order Now

A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation?
A.   Network tap
B.   Honeypot
C.   Aggregation
D.   Port mirror

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Which of the following is a security consideration for IoT devices?
A.   IoT devices have built-in accounts that users rarely access.
B.   IoT devices have less processing capabilities.
C.   IoT devices are physically segmented from each other.
D.   IoT devices have purpose-built applications.

Looking for a similar assignment? Get help from our qualified experts!

Order Now