QUESTION NUMBER 96-101
96. What is the need for log management?
Refer question number 73
97. What are the challenges in log management?
Refer question number 69
98. Explain the...
MscIT study materials
Breaking News
Tuesday, August 25, 2015
ISM unit 3 question bank answers 91-95
QUESTION NUMBER 91-95
91. Write a short note on Key Management Policy.
Refer question number 86
92. Explain any six server security principles.
When addressing server security issues, it is...
Labels:
ISM unit 3 qb answer
Monday, August 24, 2015
ISM unit 3 question bank answers 86-90
QUESTION NUMBER 86-90
86. Write a short note on key management policy.
Each U.S. Government organization that manages cryptographic systems that are intended to
protect sensitive information...
Labels:
ISM unit 3 qb answer
ISM unit 3 question bank answers 81-85
QUESTION NUMBER 81-85
81. What is The Patch and Vulnerability Group & what are their duties?
The Patch and Vulnerability Group(PVG)
The PVG should be a formal group that incorporates...
Labels:
ISM unit 3 qb answer
Saturday, August 22, 2015
ISM unit 3 question bank answers 76-80
QUESTION NUMBER 76-80
76. What are the recommended capabilities of an antivirus software?
Antivirus software is the most commonly used technical control for malware threat mitigation. There...
Labels:
ISM unit 3 qb answer
ISM unit 3 question bank answers 71-75
QUESTION NUMBER 71-75
71. What are the various functions of log management infrastructure?
Refer question number 67
72. Write short note on Syslog Securi...
Labels:
ISM unit 3 qb answer
ISM unit 3 question bank answers 66-70
QUESTION NUMBER 66-70
66. List the most commonly logged types of information and their potential benefits.
The following lists some of the most commonly logged types of information and the potential...
Labels:
ISM unit 3 qb answer
Thursday, August 20, 2015
ISM unit 3 question bank answers 61-65
QUESTION NUMBER 61-65
61. What are the various components of PKI?
Functional elements of a public key infrastructure include certification authorities, registration authorities, repositories,...
Labels:
ISM unit 3 qb answer
Sunday, August 16, 2015
ISM unit 2 question bank answers 55-60
QUESTION NUMBER 55-60
55. Recovering From a Security Compromise
Most organizations eventually face a successful compromise of one or more hosts on their networ...
Labels:
ISM unit 2 qb answer
ISM unit 2 question bank answers 50-54
QUESTION NUMBER 50-54
50. State IEEE 802.11 Network Components and explain its Architectural Models.
IEEE 802.11 has two fundamental architectural components, as follows:
• ¬ Station (STA). A...
Labels:
ISM unit 2 qb answer
ISM unit 2 question bank answers 45-49
QUESTION NUMBER 45-49
45. What are the various policies based on applications, user identity & Network Activity.
Policies Based on Applications
Most early firewall work involved simply blocking...
Labels:
ISM unit 2 qb answer
Saturday, August 15, 2015
ISM unit 2 question bank answers 40-44
QUESTION NUMBER 40-...
Labels:
ISM unit 2 qb answer
ISM unit 2 question bank answers 35-39
QUESTION NUMBER 35-39
35. Explain how firewall act as network address translators.
Most firewalls can perform NAT, which is sometimes called port address translation (PAT) or...
Labels:
ISM unit 2 qb answer
Friday, August 14, 2015
ISM unit 2 question bank answers 30-34
QUESTION BANK 30-34
30. What are the typical components of network based IDPS
A typical network-based IDPS is composed of sensors, one or more management servers, multiple...
Labels:
ISM unit 2 qb answer
Thursday, August 13, 2015
ISM unit 2 question bank answers 25-29
QUESTION NUMBER 25-29
25. What are the various uses of IDPS technologies?
IDPSs are primarily focused on identifying possible incidents. For example, an IDPS could detect...
Labels:
ISM unit 2 qb answer
Wednesday, August 12, 2015
ISM unit 5 question bank answers 132-136
QUESTION NUMBER 132-136
132. How is the collection of files done in forensic science?
Data Collection
The first step in the forensic process is to identify potential sources
of data and acquire...
Labels:
ISM unit 5 qb answer
ISM unit 5 question bank answers 127-131

QUESTION NUMBER 127-131
127. What are the control objectives of ISO 17799 standard?
ISO 17799 is an information security code of practice. It includes a number of sections, covering a wide range...
Labels:
ISM unit 5 qb answer
Tuesday, August 11, 2015
ISM unit 5 question bank answers 122-126
QUESTION NUMBER 122-126
122. Write a note on forensic toolkit.
Analysts should have access to various tools that enable them to perform examinations and analysis of data, as well as some collection...
Labels:
ISM unit 5 qb answer
Monday, August 10, 2015
ISM unit 5 question bank answers 117-121

QUESTION NUMBER 117-121
117. What is forensic science? What is the need of it?
The techniques and processes presented in this guide are based on principles of digital forensics. Forensic science...
Labels:
ISM unit 5 qb answer
Quiz Handling System Project in Visual Basic
Quiz Handling System Project in Visual Basic
This Quiz Handling System Project in Visual Basic is mainly useful in conducting the quiz . This project is performed in Visual Basic...
Labels:
visual basic project
Subscribe to:
Posts (Atom)