Question: Please answer all questions 32- The Chief Information Security Officer (CISO) received a notification that a high-ranking employee is stealing cooperate secrets for a competing

Please answer all questions  Please answer all questions 32- The Chief Information Security Officer (CISO)

32- The Chief Information Security Officer (CISO) received a notification that a high-ranking employee is stealing cooperate secrets for a competing organization. The employee is now considered A) a risk B) an exploit C) a threat D) a vulnerability 33- A PKI users has been compromised, and they user's certificate has been revoked. Which of the following protocols will the web application use to ensure the certificate cannot be used? A) CRL B) OCSP C) Key escrow D) CA 34- A Security specialist is trying to determine the software product and version of several HTTP and SMTP servers on the network. The specialist decided a quick banner grab should suffice. Which of the following protocols would be the MOST helpful in accomplishing this goals? A) SSH B) DNS C) Telnet D) SCP E) TFTP

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!