Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
A. Disaster Recovery Plan
B. Business Continuity Plan
C. Contingency Plan
D. Continuity of Operations Plan
Which of the following is a mechanism that helps to ensure that only the intended and authorized recipients are able to read the data?
A. access to information
B. none
C. integrity
D. authentication
E. confidence
Which of the following layers of the TCP/IP model maintains data integrity by ensuring that messages are delivered in the order in which they are sent and that there is no loss or duplication?
A. Transport layer
B. Link layer
C. Internet layer
D. Application layer
Which of the following classes of IP addresses provides a maximum of only 254 host addresses per network ID?
A. Class D
B. Class B
C. Class C
D. Class A
Which of the following is a presentation layer protocol?
A. TCP
B. RPC
C. BGP
D. LWAPP
Kyle is an IT technician managing 25 workstations and 4 servers. The servers run applications and mostly store confidential data. Kyle must backup the server's data daily to ensure nothing is lost. The power in the company's office is not always reliable, Kyle needs to make sure the servers do not go down or are without power for too long. Kyle decides to purchase an Uninterruptible Power Supply (UPS) that has a pair of inverters and converters to charge the battery and provides power when needed. What type of UPS has Kyle purchased?
A. Kyle purchased a Ferro resonant Standby UPS.
B. Kyle purchased a Line-Interactive UPS
C. He has bought a Standby UPS
D. He purchased a True Online UPS.
Identity the method involved in purging technique of data destruction.
A. Incineration
B. Overwriting
C. Degaussing
D. Wiping
Who is responsible for executing the policies and plans required for supporting the information technology and computer systems of an organization?
A. Senior management
B. IT security practitioners
C. Business and functional managers
D. Chief Information Officer (CIO)
Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the script execution policy. He wants to allow the execution of the scripts that are signed by a trusted publisher. Which of the following script execution policy setting this?
A. AllSigned
B. Restricted
C. RemoteSigned
D. Unrestricted
Fill in the blank with the appropriate term. In computing, is a class of data storage devices that read their data in sequence.