CSS745 Solutions

CSS745

Possible threat to any information cannot be

reduced

transferred

protected

—>> ignored

From the options below, which of them is not a vulnerability to information security

—>> flood

without deleting data, disposal of storage media

unchanged default password

latest patches and updates not done

The full form of EDR is …….

Endless Detection and Recovery

Endpoint Detection and recovery

Early detection and response

—>> Endpoint Detection and response

Compromising confidential information comes under ……

Bug

—>> Threat

Vulnerability

Attack

……technology is used for analyzing and monitoring traffic in network and information flow

Cloud access security brokers

Managed detection and response

Network Security Firewall

—>> Network traffic analysis

6. From the options below, which of them is not a threat to information security

Disaster

Eavesdropping

Information leakage

—>> Unchanged default password

…… platforms are used for safety and protection of information in the cloud

—>> Cloud workload protection platforms

Cloud security protocols

AWS

One Drive

Which of the following information security technology is used for avoiding browser-based hacking

Anti-malware in browsers

—>> Remote browser access

Adware remover in browsers

Incognito mode in a browser

Lack of access control policy is a ……..

Bug

Threat

—>> Vulnerability

Attack

………. is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Network Security

Database Security

—>> Information Security

Physical Security

 

JOIN OUR TELEGRAM ON VIP NOUN UPDATES – FOR FREE CSS745 PAST QUESTIONS AND EXAMS SUMMARIES

Leave a Reply

MEET OVER 2000 NOUN STUDENTS HERE. 

Join us for latest NOUN UPDATES and Free TMA answers posted by students on our Telegram. 

OUR ONLINE TUTORIAL CLASS IS NOW ON!!! JOIN US NOW. 
JOIN NOW!
close-link
%d bloggers like this: