Question: Please answer all questions 32- The Chief Information Security Officer (CISO) received a notification that a high-ranking employee is stealing cooperate secrets for a competing
32- The Chief Information Security Officer (CISO) received a notification that a high-ranking employee is stealing cooperate secrets for a competing organization. The employee is now considered A) a risk B) an exploit C) a threat D) a vulnerability 33- A PKI users has been compromised, and they user's certificate has been revoked. Which of the following protocols will the web application use to ensure the certificate cannot be used? A) CRL B) OCSP C) Key escrow D) CA 34- A Security specialist is trying to determine the software product and version of several HTTP and SMTP servers on the network. The specialist decided a quick banner grab should suffice. Which of the following protocols would be the MOST helpful in accomplishing this goals? A) SSH B) DNS C) Telnet D) SCP E) TFTP
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
