DNS is a secure protocol. It uses 53/udp for query and 53/tcp for a transfer. Split DNS is used to a primary and secondary DNS server. A reverse lookup returns the information about who registered or "owns" the domain name. Split DNS is used to a public and private IP address space.
22.Which of the following is an example of a pear phishing attack? A. Targeting an executive with an SMS attack B. Targeting a specific team with an email attack C. Targeting random users with a USB key drop D. Targeting an organization with a watering hole attack Answer: B
Sep 21, 2018 · d. The janitor trips over a cord in the computer room that was exposed on the floor and crashes a server. Question 8 1 out of 1 points Which of the following is an example of an intentional threat? Answers: a. An electrical fire in the computer room b. A program was not written with security in mind, so has many bugs c. Cheap hard drives were purchased from …
Feb 14, 2018 · An example is with a Certificate Authority that issues digital certificates where one role can only identify-proof the person the requesting the certificate and issue a request, and a different person can actually issue the digital certificate. a. Separation of Duties b. Job Rotation c. Need to Know d. Acceptable Use.
Because it allows users to connect to intranet from remote locations. Users easily connect to network resources. Users can dial in if the remote access server is a dial-in server. Also you can use a virtual private network (VPN). A VPN allows a user to access the private network over a public network such as internet.
Short-term are risks that can be fixed rapidly and will (more than likely) not have long term effects on the company , long term risks are risks that can end in fines if they involve compliance issues. On-going duties are the daily duties that must be done in order for the company to perform with minimal risks. 7.