ABC Corporation’s network is configured such that a user must log in individually at each server and access control. Which type of authentication is in use? A. Role-based access control B. Three-factor authentication C. Single sign-on D. Hybrid access control…

Internal intrusions are loosely divided into which categories? (Choose TWO.) A. Attempts by insiders to perform appropriate acts, on information assets to which they have been given rights or permissions. B. Attempts by insiders to access resources, without proper access…

A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protect sensitive, but unclassified, information. What is the name of this Standard? A. Triple DES B. Blowfish C. AES D.…

If a firewall receives traffic not explicitly permitted by its security policy, what should the firewall do? A. Nothing B. Do not log and drop the traffic. C. Log and drop the traffic. D. Log and pass the traffic. E.…