Question of the Week
OWA
Week 27:OWA Formerly known as Outlook Web Access, OWA is remarketed as Outlook Web Application, which is used to access your Exchange Online account via a web browser.
What do you mean by Cybersecurity?
Week 41:What do you mean by Cyber security? Cyber security is the combination of best processes and practices to ensure the security of networks, computers, programs, data and information from attack, damage or unauthorized access.
A system administrator is configuring accounts on a newly established server. Which of the following characteristics BEST differentiates service accounts from other types of accounts?
Week 40:A system administrator is configuring accounts on a newly established server. Which of the following characteristics BEST differentiates service accounts from other types of accounts? A. They can often be restricted in privilege.B. They are meant for...
An input field that is accepting more data than has been allocated for it in memory is an attribute of:
Week 39:An input field that is accepting more data than has been allocated for it in memory is an attribute of: A. buffer overflow.B. memory leak.C. cross-site request forgery.D. resource exhaustion.Answer: (A)
Which of the following if used would BEST reduce the number of successful phishing attacks?
Week 38:Which of the following if used would BEST reduce the number of successful phishing attacks? A. Two-factor authenticationB. Application layer firewallC. MantrapsD. User trainingAnswer: (D)
The process of presenting a user ID to a validating system is known as:
Week 37:The process of presenting a user ID to a validating system is known as: Enter the response to the Question of the Week here. Enter the response to the Question of the Week here. Enter the response to the Question of the Week here. Enter the response to the...
Recently, a company has been facing an issue with shoulder surfing. Which of the following safeguards would help with this?
Week 36:Recently, a company has been facing an issue with shoulder surfing. Which of the following safeguards would help with this? A. Screen filtersB. Biometric authenticationC. Smart cardsD. Video camerasAnswer: (A)
oe, a security analyst, is asked by a co-worker, “What is this AAA thing all about in the security world? Sounds like something I can use for my car.” Which of the following terms should Joe discuss in his response to his co-worker? (Select THREE).
Week 35:oe, a security analyst, is asked by a co-worker, "What is this AAA thing all about in the security world? Sounds like something I can use for my car." Which of the following terms should Joe discuss in his response to his co-worker? (Select THREE). A....
A network technician is connecting to a switch to modify the configuration. DHCP is not enabled on the management port. Which of the following does the technician need to configure to connect to the device?
Week 34:A network technician is connecting to a switch to modify the configuration. DHCP is not enabled on the management port. Which of the following does the technician need to configure to connect to the device? A. IP addressB. Default gatewayC. DNS addressD....
What are “brute force attacks?”
Week 33:What are "brute force attacks?" In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases...
What is Identity Management?
Week 32:What is Identity Management? Identity management is also known as identity and access management. IAM refers to a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology...
What is SIEM?
Week 31:What is SIEM? In the field of computer security, security information and event management software products and services combine security information management and security event management. They provide real-time analysis of security alerts generated by...