Question 91

Who should participate in creation a business continuity plan

Correct Answer:D

Question 92

Which of the following is not a feature of a cryptographic hash function

Correct Answer:D

Question 93

Which is the loopback address

Correct Answer:D

Question 94

Which type of malware encrypts a users file system and demands payment in exchange of decrypting key

Correct Answer:D

Question 95

What is the most important aspect of security awareness/training?

Correct Answer:C

Question 96

Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?

Correct Answer:C

START CC EXAM