Who should participate in creation a business continuity plan
Correct Answer:D
Which of the following is not a feature of a cryptographic hash function
Correct Answer:D
Which is the loopback address
Correct Answer:D
Which type of malware encrypts a users file system and demands payment in exchange of decrypting key
Correct Answer:D
What is the most important aspect of security awareness/training?
Correct Answer:C
Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?
Correct Answer:C