1. The chief security officer wants to know the most popular biometric methods, based on user acceptance. Which of thefollowing is the most popular biometric method, based on user acceptance?
A) iris scan B) retina scan C) keystroke pattern D) voice pattern
2. Which of the following is typically used with big data?
A) BGP B) AI C) Hadoop D) CERT
3. The email administrator has suggested that a technique called SPF should be deployed. What issue does this address?
A) whaling B) email spoofing C) spear phishing D) captured messages
4. Your organization must comply with several industry and governmental standards to protect private and confidentialinformation. You must analyze which standards to implement. Which standards should you consider?
A) de jure standards only B) de facto standards only C) open standards only D) open standards, de facto standards, and de jure standards
5. Which of the following is a software layer that operates as a gatekeeper between the organization - s on-premise network and aprovider - s cloud environment?
A) PaaP B) CASB C) SecaaS D) MSSP
1. Right Answer: D Explanation: The following is a list of the most popular biometric methods, ranked by user acceptance, starting with the methods that are most popular: 1. Voice pattern 2. Keystroke pattern 3. Signature dynamics 4. Hand geometry 5. Hand print 930 6. Fingerprint 7. Iris scan 8. Retina scan
2. Right Answer: C Explanation: Hadoop is an open-source software framework used for distributed storage and processing of big data.
3. Right Answer: B Explanation: Sender Policy Framework (SPF) is an email validation system that works by using DNS to determine whether an email sent by someone has been sent by a host sanctioned by that domain s administrator. If it can t be validated, it is not delivered to the recipient s inbox.
4. Right Answer: D Explanation: You should consider open standards, de facto standards, and de jure standards.
5. Right Answer: B Explanation: A cloud security broker, or cloud access security broker (CASB), is a software layer that operates as a gatekeeper between an organization s on-premise network and a provider s cloud environment.
Leave a comment