{"id":93601,"date":"2024-11-29T01:58:50","date_gmt":"2024-11-29T01:58:50","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=93601"},"modified":"2024-11-29T01:58:50","modified_gmt":"2024-11-29T01:58:50","slug":"lpi-020-100-dumps-v8-02-maximize-your-success-in-the-security-essentials-exam-with-the-latest-exam-dumps","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/lpi-020-100-dumps-v8-02-maximize-your-success-in-the-security-essentials-exam-with-the-latest-exam-dumps.html","title":{"rendered":"Lpi 020-100 Dumps (V8.02) &#8211; Maximize Your Success in the Security Essentials Exam with the Latest Exam Dumps"},"content":{"rendered":"<p>We introduced the 020-100 dumps in our article, \u201c<a href=\"https:\/\/www.dumpsbase.com\/news\/Real_020-100_Exam_Dumps_An_Effective_Way_to_Prepare_for_Your_Lpi_Security_Essentials_020-100_Exam.html\"><em><strong>Real 020-100 Exam Dumps &#8211; An Effective Way to Prepare for Your Lpi Security Essentials 020-100 Exam<\/strong><\/em><\/a>\u201d. We guarantee that you can pass your 020-100 exam with our dumps. DumpsBase\u2019s 020-100 dumps (V8.02) contain 228 practice exam questions and answers. These Q&amp;As are crafted and verified by industry experts to ensure they are up-to-date and aligned with the actual exam format. This gives you confidence that you&#8217;re studying the right materials and focusing on the important topics. You can trust DumpsBase, our Lpi 020-100 dumps cover all essential topics, helping you sharpen your Linux skills. By preparing with these expertly designed questions, you\u2019ll improve your competencies and guarantee your readiness for the exam. Choose DumpsBase today, you can confidently pass the Lpi Security Essentials 1.0 certification exam on your first attempt and boost your Linux skills effortlessly.<\/p>\n<h2>Below are the Lpi Security Essentials <em><span style=\"background-color: #00ffff;\">020-100 free dumps<\/span><\/em> for reading first:<\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam9250\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-9250\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-9250\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-367068'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Which of the following methods can be used to ensure integrity of data during transmission?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='367068' \/><input type='hidden' id='answerType367068' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367068[]' id='answer-id-1430150' class='answer   answerof-367068 ' value='1430150'   \/><label for='answer-id-1430150' id='answer-label-1430150' class=' answer'><span>Passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367068[]' id='answer-id-1430151' class='answer   answerof-367068 ' value='1430151'   \/><label for='answer-id-1430151' id='answer-label-1430151' class=' answer'><span>Encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367068[]' id='answer-id-1430152' class='answer   answerof-367068 ' value='1430152'   \/><label for='answer-id-1430152' id='answer-label-1430152' class=' answer'><span>Two-factor authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367068[]' id='answer-id-1430153' class='answer   answerof-367068 ' value='1430153'   \/><label for='answer-id-1430153' id='answer-label-1430153' class=' answer'><span>Redundancy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-367069'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>Which of the following backup types is best suited for daily use?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='367069' \/><input type='hidden' id='answerType367069' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367069[]' id='answer-id-1430154' class='answer   answerof-367069 ' value='1430154'   \/><label for='answer-id-1430154' id='answer-label-1430154' class=' answer'><span>Synthetic backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367069[]' id='answer-id-1430155' class='answer   answerof-367069 ' value='1430155'   \/><label for='answer-id-1430155' id='answer-label-1430155' class=' answer'><span>Full backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367069[]' id='answer-id-1430156' class='answer   answerof-367069 ' value='1430156'   \/><label for='answer-id-1430156' id='answer-label-1430156' class=' answer'><span>Incremental backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367069[]' id='answer-id-1430157' class='answer   answerof-367069 ' value='1430157'   \/><label for='answer-id-1430157' id='answer-label-1430157' class=' answer'><span>Differential backup<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-367070'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Which of the following is a security implication of physical access to a computer?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='367070' \/><input type='hidden' id='answerType367070' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367070[]' id='answer-id-1430158' class='answer   answerof-367070 ' value='1430158'   \/><label for='answer-id-1430158' id='answer-label-1430158' class=' answer'><span>Unauthorized access to data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367070[]' id='answer-id-1430159' class='answer   answerof-367070 ' value='1430159'   \/><label for='answer-id-1430159' id='answer-label-1430159' class=' answer'><span>Improved processor performance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367070[]' id='answer-id-1430160' class='answer   answerof-367070 ' value='1430160'   \/><label for='answer-id-1430160' id='answer-label-1430160' class=' answer'><span>Decreased memory capacity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367070[]' id='answer-id-1430161' class='answer   answerof-367070 ' value='1430161'   \/><label for='answer-id-1430161' id='answer-label-1430161' class=' answer'><span>Increased network speed<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-367071'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>You want to access a website that is blocked in your country. <br \/>\r<br>Which of the following solutions would be the most appropriate for accessing the website?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='367071' \/><input type='hidden' id='answerType367071' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367071[]' id='answer-id-1430162' class='answer   answerof-367071 ' value='1430162'   \/><label for='answer-id-1430162' id='answer-label-1430162' class=' answer'><span>Network-attached storage<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367071[]' id='answer-id-1430163' class='answer   answerof-367071 ' value='1430163'   \/><label for='answer-id-1430163' id='answer-label-1430163' class=' answer'><span>Using an unencrypted public Wi-Fi network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367071[]' id='answer-id-1430164' class='answer   answerof-367071 ' value='1430164'   \/><label for='answer-id-1430164' id='answer-label-1430164' class=' answer'><span>A public VPN provider<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367071[]' id='answer-id-1430165' class='answer   answerof-367071 ' value='1430165'   \/><label for='answer-id-1430165' id='answer-label-1430165' class=' answer'><span>Clearing your browser's cache<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-367072'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>You are setting up a Bluetooth connection between your smartphone and a wireless speaker. <br \/>\r<br>What security measure should you take to protect your data?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='367072' \/><input type='hidden' id='answerType367072' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367072[]' id='answer-id-1430166' class='answer   answerof-367072 ' value='1430166'   \/><label for='answer-id-1430166' id='answer-label-1430166' class=' answer'><span>Use a strong and unique password for the Bluetooth connection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367072[]' id='answer-id-1430167' class='answer   answerof-367072 ' value='1430167'   \/><label for='answer-id-1430167' id='answer-label-1430167' class=' answer'><span>Enable Bluetooth pairing mode on your smartphone<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367072[]' id='answer-id-1430168' class='answer   answerof-367072 ' value='1430168'   \/><label for='answer-id-1430168' id='answer-label-1430168' class=' answer'><span>Leave the Bluetooth connection open to all nearby devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367072[]' id='answer-id-1430169' class='answer   answerof-367072 ' value='1430169'   \/><label for='answer-id-1430169' id='answer-label-1430169' class=' answer'><span>Disable Bluetooth after the connection is established<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-367073'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>What is the primary function of an endpoint firewall?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='367073' \/><input type='hidden' id='answerType367073' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367073[]' id='answer-id-1430170' class='answer   answerof-367073 ' value='1430170'   \/><label for='answer-id-1430170' id='answer-label-1430170' class=' answer'><span>To protect a single device from unauthorized access or attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367073[]' id='answer-id-1430171' class='answer   answerof-367073 ' value='1430171'   \/><label for='answer-id-1430171' id='answer-label-1430171' class=' answer'><span>To store data securely<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367073[]' id='answer-id-1430172' class='answer   answerof-367073 ' value='1430172'   \/><label for='answer-id-1430172' id='answer-label-1430172' class=' answer'><span>To manage hardware components<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367073[]' id='answer-id-1430173' class='answer   answerof-367073 ' value='1430173'   \/><label for='answer-id-1430173' id='answer-label-1430173' class=' answer'><span>To improve network performance<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-367074'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>What is the darknet?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='367074' \/><input type='hidden' id='answerType367074' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367074[]' id='answer-id-1430174' class='answer   answerof-367074 ' value='1430174'   \/><label for='answer-id-1430174' id='answer-label-1430174' class=' answer'><span>A type of network that is used for illegal activities<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367074[]' id='answer-id-1430175' class='answer   answerof-367074 ' value='1430175'   \/><label for='answer-id-1430175' id='answer-label-1430175' class=' answer'><span>A type of network that is only accessible through TOR<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367074[]' id='answer-id-1430176' class='answer   answerof-367074 ' value='1430176'   \/><label for='answer-id-1430176' id='answer-label-1430176' class=' answer'><span>A type of network that is not connected to the internet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367074[]' id='answer-id-1430177' class='answer   answerof-367074 ' value='1430177'   \/><label for='answer-id-1430177' id='answer-label-1430177' class=' answer'><span>Cloud Storage<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-367075'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Which of the following legal concepts is concerned with compensating someone for harm caused by a security breach?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='367075' \/><input type='hidden' id='answerType367075' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367075[]' id='answer-id-1430178' class='answer   answerof-367075 ' value='1430178'   \/><label for='answer-id-1430178' id='answer-label-1430178' class=' answer'><span>Public law<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367075[]' id='answer-id-1430179' class='answer   answerof-367075 ' value='1430179'   \/><label for='answer-id-1430179' id='answer-label-1430179' class=' answer'><span>Copyright law<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367075[]' id='answer-id-1430180' class='answer   answerof-367075 ' value='1430180'   \/><label for='answer-id-1430180' id='answer-label-1430180' class=' answer'><span>Financial compensation claims<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367075[]' id='answer-id-1430181' class='answer   answerof-367075 ' value='1430181'   \/><label for='answer-id-1430181' id='answer-label-1430181' class=' answer'><span>Liability<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-367076'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>What is the purpose of the GDPR?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='367076' \/><input type='hidden' id='answerType367076' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367076[]' id='answer-id-1430182' class='answer   answerof-367076 ' value='1430182'   \/><label for='answer-id-1430182' id='answer-label-1430182' class=' answer'><span>To encourage the collection and sharing of personal data without restriction<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367076[]' id='answer-id-1430183' class='answer   answerof-367076 ' value='1430183'   \/><label for='answer-id-1430183' id='answer-label-1430183' class=' answer'><span>To encourage the use of insecure data storage methods<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367076[]' id='answer-id-1430184' class='answer   answerof-367076 ' value='1430184'   \/><label for='answer-id-1430184' id='answer-label-1430184' class=' answer'><span>The GDPR is a type of virus that infects computer systems and steals personal information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367076[]' id='answer-id-1430185' class='answer   answerof-367076 ' value='1430185'   \/><label for='answer-id-1430185' id='answer-label-1430185' class=' answer'><span>To protect personal information of individuals in the European Union<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-367077'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Which of the following is a type of software that is embedded in hardware devices and provides instructions to the hardware to perform specific tasks?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='367077' \/><input type='hidden' id='answerType367077' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367077[]' id='answer-id-1430186' class='answer   answerof-367077 ' value='1430186'   \/><label for='answer-id-1430186' id='answer-label-1430186' class=' answer'><span>Desktop applications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367077[]' id='answer-id-1430187' class='answer   answerof-367077 ' value='1430187'   \/><label for='answer-id-1430187' id='answer-label-1430187' class=' answer'><span>Server software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367077[]' id='answer-id-1430188' class='answer   answerof-367077 ' value='1430188'   \/><label for='answer-id-1430188' id='answer-label-1430188' class=' answer'><span>Firmware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367077[]' id='answer-id-1430189' class='answer   answerof-367077 ' value='1430189'   \/><label for='answer-id-1430189' id='answer-label-1430189' class=' answer'><span>Web applications<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-367078'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>What is blockchain?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='367078' \/><input type='hidden' id='answerType367078' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367078[]' id='answer-id-1430190' class='answer   answerof-367078 ' value='1430190'   \/><label for='answer-id-1430190' id='answer-label-1430190' class=' answer'><span>Blockchain is a digital currency.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367078[]' id='answer-id-1430191' class='answer   answerof-367078 ' value='1430191'   \/><label for='answer-id-1430191' id='answer-label-1430191' class=' answer'><span>Blockchain is a type of database management system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367078[]' id='answer-id-1430192' class='answer   answerof-367078 ' value='1430192'   \/><label for='answer-id-1430192' id='answer-label-1430192' class=' answer'><span>Blockchain is a proprietary software platform developed by a single company.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367078[]' id='answer-id-1430193' class='answer   answerof-367078 ' value='1430193'   \/><label for='answer-id-1430193' id='answer-label-1430193' class=' answer'><span>A type of database that uses a network of nodes to store information in a decentralized manner<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-367079'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>Which of the following is a fraudulent activity designed to deceive individuals into providing sensitive information or transferring funds to unauthorized parties in the context of IT security?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='367079' \/><input type='hidden' id='answerType367079' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367079[]' id='answer-id-1430194' class='answer   answerof-367079 ' value='1430194'   \/><label for='answer-id-1430194' id='answer-label-1430194' class=' answer'><span>Intrusion detection system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367079[]' id='answer-id-1430195' class='answer   answerof-367079 ' value='1430195'   \/><label for='answer-id-1430195' id='answer-label-1430195' class=' answer'><span>Data encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367079[]' id='answer-id-1430196' class='answer   answerof-367079 ' value='1430196'   \/><label for='answer-id-1430196' id='answer-label-1430196' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367079[]' id='answer-id-1430197' class='answer   answerof-367079 ' value='1430197'   \/><label for='answer-id-1430197' id='answer-label-1430197' class=' answer'><span>Scamming<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-367080'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>What is the purpose of an RFID tag?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='367080' \/><input type='hidden' id='answerType367080' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367080[]' id='answer-id-1430198' class='answer   answerof-367080 ' value='1430198'   \/><label for='answer-id-1430198' id='answer-label-1430198' class=' answer'><span>To enable wireless communication between devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367080[]' id='answer-id-1430199' class='answer   answerof-367080 ' value='1430199'   \/><label for='answer-id-1430199' id='answer-label-1430199' class=' answer'><span>To store and transfer data wirelessly<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367080[]' id='answer-id-1430200' class='answer   answerof-367080 ' value='1430200'   \/><label for='answer-id-1430200' id='answer-label-1430200' class=' answer'><span>To connect devices to the internet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367080[]' id='answer-id-1430201' class='answer   answerof-367080 ' value='1430201'   \/><label for='answer-id-1430201' id='answer-label-1430201' class=' answer'><span>To control network traffic<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-367081'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>Which type of asymmetric encryption algorithm provides better security than an equivalent RSA key of the same size and is commonly used in mobile devices?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='367081' \/><input type='hidden' id='answerType367081' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367081[]' id='answer-id-1430202' class='answer   answerof-367081 ' value='1430202'   \/><label for='answer-id-1430202' id='answer-label-1430202' class=' answer'><span>RSA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367081[]' id='answer-id-1430203' class='answer   answerof-367081 ' value='1430203'   \/><label for='answer-id-1430203' id='answer-label-1430203' class=' answer'><span>Diffie-Hellman<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367081[]' id='answer-id-1430204' class='answer   answerof-367081 ' value='1430204'   \/><label for='answer-id-1430204' id='answer-label-1430204' class=' answer'><span>ECC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367081[]' id='answer-id-1430205' class='answer   answerof-367081 ' value='1430205'   \/><label for='answer-id-1430205' id='answer-label-1430205' class=' answer'><span>IDEA<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-367082'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Which of the following is a technology used for sending and receiving encrypted emails in Mozilla Thunderbird?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='367082' \/><input type='hidden' id='answerType367082' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367082[]' id='answer-id-1430206' class='answer   answerof-367082 ' value='1430206'   \/><label for='answer-id-1430206' id='answer-label-1430206' class=' answer'><span>SMTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367082[]' id='answer-id-1430207' class='answer   answerof-367082 ' value='1430207'   \/><label for='answer-id-1430207' id='answer-label-1430207' class=' answer'><span>OpenPGP and S\/MIME<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367082[]' id='answer-id-1430208' class='answer   answerof-367082 ' value='1430208'   \/><label for='answer-id-1430208' id='answer-label-1430208' class=' answer'><span>POP3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367082[]' id='answer-id-1430209' class='answer   answerof-367082 ' value='1430209'   \/><label for='answer-id-1430209' id='answer-label-1430209' class=' answer'><span>IMAP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-367083'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>What is the most effective type of phishing for targeting key executives within an organization?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='367083' \/><input type='hidden' id='answerType367083' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367083[]' id='answer-id-1430210' class='answer   answerof-367083 ' value='1430210'   \/><label for='answer-id-1430210' id='answer-label-1430210' class=' answer'><span>Spearphishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367083[]' id='answer-id-1430211' class='answer   answerof-367083 ' value='1430211'   \/><label for='answer-id-1430211' id='answer-label-1430211' class=' answer'><span>Whaling<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367083[]' id='answer-id-1430212' class='answer   answerof-367083 ' value='1430212'   \/><label for='answer-id-1430212' id='answer-label-1430212' class=' answer'><span>Vishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367083[]' id='answer-id-1430213' class='answer   answerof-367083 ' value='1430213'   \/><label for='answer-id-1430213' id='answer-label-1430213' class=' answer'><span>Smishing<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-367084'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>You are tasked with securely storing backups of sensitive data in a cloud service. <br \/>\r<br>Which security measure should you implement to help ensure data privacy?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='367084' \/><input type='hidden' id='answerType367084' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367084[]' id='answer-id-1430214' class='answer   answerof-367084 ' value='1430214'   \/><label for='answer-id-1430214' id='answer-label-1430214' class=' answer'><span>Physical security measures for the cloud server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367084[]' id='answer-id-1430215' class='answer   answerof-367084 ' value='1430215'   \/><label for='answer-id-1430215' id='answer-label-1430215' class=' answer'><span>Encryption of backups before uploading to the cloud service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367084[]' id='answer-id-1430216' class='answer   answerof-367084 ' value='1430216'   \/><label for='answer-id-1430216' id='answer-label-1430216' class=' answer'><span>Two-factor authentication for accessing backups<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367084[]' id='answer-id-1430217' class='answer   answerof-367084 ' value='1430217'   \/><label for='answer-id-1430217' id='answer-label-1430217' class=' answer'><span>Password-protected backups<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-367085'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Which of the following is a type of attack where an attacker intercepts and reads network traffic?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='367085' \/><input type='hidden' id='answerType367085' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367085[]' id='answer-id-1430218' class='answer   answerof-367085 ' value='1430218'   \/><label for='answer-id-1430218' id='answer-label-1430218' class=' answer'><span>Botnet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367085[]' id='answer-id-1430219' class='answer   answerof-367085 ' value='1430219'   \/><label for='answer-id-1430219' id='answer-label-1430219' class=' answer'><span>Traffic interception<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367085[]' id='answer-id-1430220' class='answer   answerof-367085 ' value='1430220'   \/><label for='answer-id-1430220' id='answer-label-1430220' class=' answer'><span>DoS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367085[]' id='answer-id-1430221' class='answer   answerof-367085 ' value='1430221'   \/><label for='answer-id-1430221' id='answer-label-1430221' class=' answer'><span>Packet filter<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-367086'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Which of the following pertains to the possible damage resulting from mistakes and service disruptions?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='367086' \/><input type='hidden' id='answerType367086' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367086[]' id='answer-id-1430222' class='answer   answerof-367086 ' value='1430222'   \/><label for='answer-id-1430222' id='answer-label-1430222' class=' answer'><span>Cost Reduction<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367086[]' id='answer-id-1430223' class='answer   answerof-367086 ' value='1430223'   \/><label for='answer-id-1430223' id='answer-label-1430223' class=' answer'><span>Operational Risks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367086[]' id='answer-id-1430224' class='answer   answerof-367086 ' value='1430224'   \/><label for='answer-id-1430224' id='answer-label-1430224' class=' answer'><span>Increased Productivity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367086[]' id='answer-id-1430225' class='answer   answerof-367086 ' value='1430225'   \/><label for='answer-id-1430225' id='answer-label-1430225' class=' answer'><span>System Errors<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-367087'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Which of the following risk management strategies seeks to minimize risk to an acceptable level?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='367087' \/><input type='hidden' id='answerType367087' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367087[]' id='answer-id-1430226' class='answer   answerof-367087 ' value='1430226'   \/><label for='answer-id-1430226' id='answer-label-1430226' class=' answer'><span>Risk avoidance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367087[]' id='answer-id-1430227' class='answer   answerof-367087 ' value='1430227'   \/><label for='answer-id-1430227' id='answer-label-1430227' class=' answer'><span>Risk transfer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367087[]' id='answer-id-1430228' class='answer   answerof-367087 ' value='1430228'   \/><label for='answer-id-1430228' id='answer-label-1430228' class=' answer'><span>Risk mitigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367087[]' id='answer-id-1430229' class='answer   answerof-367087 ' value='1430229'   \/><label for='answer-id-1430229' id='answer-label-1430229' class=' answer'><span>Risk acceptance<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-367088'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>You suspect that someone has been intercepting and reading the network traffic on your home WiFi network. <br \/>\r<br>What type of attack is this?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='367088' \/><input type='hidden' id='answerType367088' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367088[]' id='answer-id-1430230' class='answer   answerof-367088 ' value='1430230'   \/><label for='answer-id-1430230' id='answer-label-1430230' class=' answer'><span>Distributed Denial of Service (DDoS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367088[]' id='answer-id-1430231' class='answer   answerof-367088 ' value='1430231'   \/><label for='answer-id-1430231' id='answer-label-1430231' class=' answer'><span>DoS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367088[]' id='answer-id-1430232' class='answer   answerof-367088 ' value='1430232'   \/><label for='answer-id-1430232' id='answer-label-1430232' class=' answer'><span>Traffic interception<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367088[]' id='answer-id-1430233' class='answer   answerof-367088 ' value='1430233'   \/><label for='answer-id-1430233' id='answer-label-1430233' class=' answer'><span>Botnet<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-367089'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Dion Solutions, a large enterprise company, needs to deploy a new software application for their employees to use. They want to make sure that their employees have access to the latest version of the software and that it is easy to manage. <br \/>\r<br>Which cloud deployment model would be the best choice for them?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='367089' \/><input type='hidden' id='answerType367089' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367089[]' id='answer-id-1430234' class='answer   answerof-367089 ' value='1430234'   \/><label for='answer-id-1430234' id='answer-label-1430234' class=' answer'><span>SaaS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367089[]' id='answer-id-1430235' class='answer   answerof-367089 ' value='1430235'   \/><label for='answer-id-1430235' id='answer-label-1430235' class=' answer'><span>IaaS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367089[]' id='answer-id-1430236' class='answer   answerof-367089 ' value='1430236'   \/><label for='answer-id-1430236' id='answer-label-1430236' class=' answer'><span>PaaS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367089[]' id='answer-id-1430237' class='answer   answerof-367089 ' value='1430237'   \/><label for='answer-id-1430237' id='answer-label-1430237' class=' answer'><span>SECaaS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-367090'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Which of the following is a key feature of BitLocker?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='367090' \/><input type='hidden' id='answerType367090' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367090[]' id='answer-id-1430238' class='answer   answerof-367090 ' value='1430238'   \/><label for='answer-id-1430238' id='answer-label-1430238' class=' answer'><span>Free and open-source<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367090[]' id='answer-id-1430239' class='answer   answerof-367090 ' value='1430239'   \/><label for='answer-id-1430239' id='answer-label-1430239' class=' answer'><span>Cross-platform support<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367090[]' id='answer-id-1430240' class='answer   answerof-367090 ' value='1430240'   \/><label for='answer-id-1430240' id='answer-label-1430240' class=' answer'><span>Integrated with Windows<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367090[]' id='answer-id-1430241' class='answer   answerof-367090 ' value='1430241'   \/><label for='answer-id-1430241' id='answer-label-1430241' class=' answer'><span>Encrypts only files<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-367091'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which of the following threats to personal information uses stolen information to make purchases or obtain loans?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='367091' \/><input type='hidden' id='answerType367091' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367091[]' id='answer-id-1430242' class='answer   answerof-367091 ' value='1430242'   \/><label for='answer-id-1430242' id='answer-label-1430242' class=' answer'><span>Identity theft<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367091[]' id='answer-id-1430243' class='answer   answerof-367091 ' value='1430243'   \/><label for='answer-id-1430243' id='answer-label-1430243' class=' answer'><span>Cyberbullying<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367091[]' id='answer-id-1430244' class='answer   answerof-367091 ' value='1430244'   \/><label for='answer-id-1430244' id='answer-label-1430244' class=' answer'><span>Financial fraud<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367091[]' id='answer-id-1430245' class='answer   answerof-367091 ' value='1430245'   \/><label for='answer-id-1430245' id='answer-label-1430245' class=' answer'><span>Social engineering attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-367092'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>Which of the following is an example of confidential information?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='367092' \/><input type='hidden' id='answerType367092' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367092[]' id='answer-id-1430246' class='answer   answerof-367092 ' value='1430246'   \/><label for='answer-id-1430246' id='answer-label-1430246' class=' answer'><span>Publicly available information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367092[]' id='answer-id-1430247' class='answer   answerof-367092 ' value='1430247'   \/><label for='answer-id-1430247' id='answer-label-1430247' class=' answer'><span>Bug Bounty programs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367092[]' id='answer-id-1430248' class='answer   answerof-367092 ' value='1430248'   \/><label for='answer-id-1430248' id='answer-label-1430248' class=' answer'><span>Public press releases<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367092[]' id='answer-id-1430249' class='answer   answerof-367092 ' value='1430249'   \/><label for='answer-id-1430249' id='answer-label-1430249' class=' answer'><span>Personal identification numbers (PINs)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-367093'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which of the following is true about S\/MIME?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='367093' \/><input type='hidden' id='answerType367093' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367093[]' id='answer-id-1430250' class='answer   answerof-367093 ' value='1430250'   \/><label for='answer-id-1430250' id='answer-label-1430250' class=' answer'><span>S\/MIME provides end-to-end encryption and digital signatures for email communications.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367093[]' id='answer-id-1430251' class='answer   answerof-367093 ' value='1430251'   \/><label for='answer-id-1430251' id='answer-label-1430251' class=' answer'><span>S\/MIME provides protection against spam.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367093[]' id='answer-id-1430252' class='answer   answerof-367093 ' value='1430252'   \/><label for='answer-id-1430252' id='answer-label-1430252' class=' answer'><span>S\/MIME is limited to certain email clients.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367093[]' id='answer-id-1430253' class='answer   answerof-367093 ' value='1430253'   \/><label for='answer-id-1430253' id='answer-label-1430253' class=' answer'><span>S\/MIME is a server that manages email communications.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-367094'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Which of the following is the role of OpenPGP key servers?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='367094' \/><input type='hidden' id='answerType367094' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367094[]' id='answer-id-1430254' class='answer   answerof-367094 ' value='1430254'   \/><label for='answer-id-1430254' id='answer-label-1430254' class=' answer'><span>OpenPGP key servers manage email communications.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367094[]' id='answer-id-1430255' class='answer   answerof-367094 ' value='1430255'   \/><label for='answer-id-1430255' id='answer-label-1430255' class=' answer'><span>OpenPGP key servers are only used with Mozilla Thunderbird.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367094[]' id='answer-id-1430256' class='answer   answerof-367094 ' value='1430256'   \/><label for='answer-id-1430256' id='answer-label-1430256' class=' answer'><span>OpenPGP key servers provide antivirus protection for email communications.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367094[]' id='answer-id-1430257' class='answer   answerof-367094 ' value='1430257'   \/><label for='answer-id-1430257' id='answer-label-1430257' class=' answer'><span>They allow users to store and retrieve public keys associated with an email address.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-367095'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>Which of the following is a plain text protocol?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='367095' \/><input type='hidden' id='answerType367095' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367095[]' id='answer-id-1430258' class='answer   answerof-367095 ' value='1430258'   \/><label for='answer-id-1430258' id='answer-label-1430258' class=' answer'><span>SSL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367095[]' id='answer-id-1430259' class='answer   answerof-367095 ' value='1430259'   \/><label for='answer-id-1430259' id='answer-label-1430259' class=' answer'><span>HTTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367095[]' id='answer-id-1430260' class='answer   answerof-367095 ' value='1430260'   \/><label for='answer-id-1430260' id='answer-label-1430260' class=' answer'><span>TLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367095[]' id='answer-id-1430261' class='answer   answerof-367095 ' value='1430261'   \/><label for='answer-id-1430261' id='answer-label-1430261' class=' answer'><span>HTTPS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-367096'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Which of the following devices is an example of an IoT device?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='367096' \/><input type='hidden' id='answerType367096' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367096[]' id='answer-id-1430262' class='answer   answerof-367096 ' value='1430262'   \/><label for='answer-id-1430262' id='answer-label-1430262' class=' answer'><span>Router<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367096[]' id='answer-id-1430263' class='answer   answerof-367096 ' value='1430263'   \/><label for='answer-id-1430263' id='answer-label-1430263' class=' answer'><span>Smartphone<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367096[]' id='answer-id-1430264' class='answer   answerof-367096 ' value='1430264'   \/><label for='answer-id-1430264' id='answer-label-1430264' class=' answer'><span>Desktop computer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367096[]' id='answer-id-1430265' class='answer   answerof-367096 ' value='1430265'   \/><label for='answer-id-1430265' id='answer-label-1430265' class=' answer'><span>Printer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-367097'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Which of the following is a router that is used as a gateway to forward traffic from a device to other networks?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='367097' \/><input type='hidden' id='answerType367097' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367097[]' id='answer-id-1430266' class='answer   answerof-367097 ' value='1430266'   \/><label for='answer-id-1430266' id='answer-label-1430266' class=' answer'><span>Default Gateway<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367097[]' id='answer-id-1430267' class='answer   answerof-367097 ' value='1430267'   \/><label for='answer-id-1430267' id='answer-label-1430267' class=' answer'><span>Switch<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367097[]' id='answer-id-1430268' class='answer   answerof-367097 ' value='1430268'   \/><label for='answer-id-1430268' id='answer-label-1430268' class=' answer'><span>Modem<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367097[]' id='answer-id-1430269' class='answer   answerof-367097 ' value='1430269'   \/><label for='answer-id-1430269' id='answer-label-1430269' class=' answer'><span>Access Point<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-367098'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Which term describes the ability to prove that a specific individual or entity performed an action, such as sending a message or conducting a transaction?<\/div><input type='hidden' name='question_id[]' id='qID_31' value='367098' \/><input type='hidden' id='answerType367098' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367098[]' id='answer-id-1430270' class='answer   answerof-367098 ' value='1430270'   \/><label for='answer-id-1430270' id='answer-label-1430270' class=' answer'><span>Non-repudiation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367098[]' id='answer-id-1430271' class='answer   answerof-367098 ' value='1430271'   \/><label for='answer-id-1430271' id='answer-label-1430271' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367098[]' id='answer-id-1430272' class='answer   answerof-367098 ' value='1430272'   \/><label for='answer-id-1430272' id='answer-label-1430272' class=' answer'><span>Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367098[]' id='answer-id-1430273' class='answer   answerof-367098 ' value='1430273'   \/><label for='answer-id-1430273' id='answer-label-1430273' class=' answer'><span>Integrity<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-367099'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>What is a script blocker?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='367099' \/><input type='hidden' id='answerType367099' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367099[]' id='answer-id-1430274' class='answer   answerof-367099 ' value='1430274'   \/><label for='answer-id-1430274' id='answer-label-1430274' class=' answer'><span>A browser extension that prevents pop-up windows<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367099[]' id='answer-id-1430275' class='answer   answerof-367099 ' value='1430275'   \/><label for='answer-id-1430275' id='answer-label-1430275' class=' answer'><span>A browser extension that removes or blocks advertisements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367099[]' id='answer-id-1430276' class='answer   answerof-367099 ' value='1430276'   \/><label for='answer-id-1430276' id='answer-label-1430276' class=' answer'><span>A browser extension that blocks scripts from running on websites<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367099[]' id='answer-id-1430277' class='answer   answerof-367099 ' value='1430277'   \/><label for='answer-id-1430277' id='answer-label-1430277' class=' answer'><span>A browser extension that helps users control and manage cookies<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-367100'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>You are concerned about your internet activity being tracked by your ISP. <br \/>\r<br>Which of the following solutions would be the most appropriate for protecting your privacy?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='367100' \/><input type='hidden' id='answerType367100' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367100[]' id='answer-id-1430278' class='answer   answerof-367100 ' value='1430278'   \/><label for='answer-id-1430278' id='answer-label-1430278' class=' answer'><span>End-to-end encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367100[]' id='answer-id-1430279' class='answer   answerof-367100 ' value='1430279'   \/><label for='answer-id-1430279' id='answer-label-1430279' class=' answer'><span>TOR<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367100[]' id='answer-id-1430280' class='answer   answerof-367100 ' value='1430280'   \/><label for='answer-id-1430280' id='answer-label-1430280' class=' answer'><span>Transfer encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367100[]' id='answer-id-1430281' class='answer   answerof-367100 ' value='1430281'   \/><label for='answer-id-1430281' id='answer-label-1430281' class=' answer'><span>Disabling your firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-367101'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>Your computer has become infected with a program that is causing it to perform slowly and display unwanted advertisements. <br \/>\r<br>What type of attack is this?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='367101' \/><input type='hidden' id='answerType367101' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367101[]' id='answer-id-1430282' class='answer   answerof-367101 ' value='1430282'   \/><label for='answer-id-1430282' id='answer-label-1430282' class=' answer'><span>DoS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367101[]' id='answer-id-1430283' class='answer   answerof-367101 ' value='1430283'   \/><label for='answer-id-1430283' id='answer-label-1430283' class=' answer'><span>Malware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367101[]' id='answer-id-1430284' class='answer   answerof-367101 ' value='1430284'   \/><label for='answer-id-1430284' id='answer-label-1430284' class=' answer'><span>Phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367101[]' id='answer-id-1430285' class='answer   answerof-367101 ' value='1430285'   \/><label for='answer-id-1430285' id='answer-label-1430285' class=' answer'><span>Exploit<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-367102'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>What is Trusted Computing?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='367102' \/><input type='hidden' id='answerType367102' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367102[]' id='answer-id-1430286' class='answer   answerof-367102 ' value='1430286'   \/><label for='answer-id-1430286' id='answer-label-1430286' class=' answer'><span>A protocol for secure communication between devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367102[]' id='answer-id-1430287' class='answer   answerof-367102 ' value='1430287'   \/><label for='answer-id-1430287' id='answer-label-1430287' class=' answer'><span>A method for encrypting data on a physical medium<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367102[]' id='answer-id-1430288' class='answer   answerof-367102 ' value='1430288'   \/><label for='answer-id-1430288' id='answer-label-1430288' class=' answer'><span>A security standard for IoT devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367102[]' id='answer-id-1430289' class='answer   answerof-367102 ' value='1430289'   \/><label for='answer-id-1430289' id='answer-label-1430289' class=' answer'><span>A set of hardware and software technologies to enhance security<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-367103'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>What is the primary goal of an attacker who interrupts services, such as by launching a Distributed Denial of Service (DDoS) attack?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='367103' \/><input type='hidden' id='answerType367103' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367103[]' id='answer-id-1430290' class='answer   answerof-367103 ' value='1430290'   \/><label for='answer-id-1430290' id='answer-label-1430290' class=' answer'><span>To manipulate or delete data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367103[]' id='answer-id-1430291' class='answer   answerof-367103 ' value='1430291'   \/><label for='answer-id-1430291' id='answer-label-1430291' class=' answer'><span>To extort ransom from the targeted organization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367103[]' id='answer-id-1430292' class='answer   answerof-367103 ' value='1430292'   \/><label for='answer-id-1430292' id='answer-label-1430292' class=' answer'><span>To cause a disruption in the availability of the targeted system or service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367103[]' id='answer-id-1430293' class='answer   answerof-367103 ' value='1430293'   \/><label for='answer-id-1430293' id='answer-label-1430293' class=' answer'><span>To gain unauthorized access to the targeted system or service<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-367104'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Which of the following is an example of an administrative control?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='367104' \/><input type='hidden' id='answerType367104' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367104[]' id='answer-id-1430294' class='answer   answerof-367104 ' value='1430294'   \/><label for='answer-id-1430294' id='answer-label-1430294' class=' answer'><span>Firewalls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367104[]' id='answer-id-1430295' class='answer   answerof-367104 ' value='1430295'   \/><label for='answer-id-1430295' id='answer-label-1430295' class=' answer'><span>Biometric scanners<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367104[]' id='answer-id-1430296' class='answer   answerof-367104 ' value='1430296'   \/><label for='answer-id-1430296' id='answer-label-1430296' class=' answer'><span>Password policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367104[]' id='answer-id-1430297' class='answer   answerof-367104 ' value='1430297'   \/><label for='answer-id-1430297' id='answer-label-1430297' class=' answer'><span>Intrusion detection systems<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-367105'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Which tool can help protect your privacy by preventing user tracking through browser fingerprinting?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='367105' \/><input type='hidden' id='answerType367105' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367105[]' id='answer-id-1430298' class='answer   answerof-367105 ' value='1430298'   \/><label for='answer-id-1430298' id='answer-label-1430298' class=' answer'><span>HTTP cookies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367105[]' id='answer-id-1430299' class='answer   answerof-367105 ' value='1430299'   \/><label for='answer-id-1430299' id='answer-label-1430299' class=' answer'><span>User tracking software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367105[]' id='answer-id-1430300' class='answer   answerof-367105 ' value='1430300'   \/><label for='answer-id-1430300' id='answer-label-1430300' class=' answer'><span>Script blockers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367105[]' id='answer-id-1430301' class='answer   answerof-367105 ' value='1430301'   \/><label for='answer-id-1430301' id='answer-label-1430301' class=' answer'><span>Ad blockers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-367106'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>As the IT administrator of a company, you are responsible for implementing a cloud storage solution. You need to consider the potential issues related to the use of cloud services, especially concerning data synchronization and accessibility. <br \/>\r<br>Which of the following should you be particularly aware of when deploying the cloud storage solution?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='367106' \/><input type='hidden' id='answerType367106' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367106[]' id='answer-id-1430302' class='answer   answerof-367106 ' value='1430302'   \/><label for='answer-id-1430302' id='answer-label-1430302' class=' answer'><span>Data loss prevention<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367106[]' id='answer-id-1430303' class='answer   answerof-367106 ' value='1430303'   \/><label for='answer-id-1430303' id='answer-label-1430303' class=' answer'><span>Encryption at rest<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367106[]' id='answer-id-1430304' class='answer   answerof-367106 ' value='1430304'   \/><label for='answer-id-1430304' id='answer-label-1430304' class=' answer'><span>Data redundancy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367106[]' id='answer-id-1430305' class='answer   answerof-367106 ' value='1430305'   \/><label for='answer-id-1430305' id='answer-label-1430305' class=' answer'><span>Dependence on Internet connection<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-367107'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>What is multi-factor authentication (MFA)?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='367107' \/><input type='hidden' id='answerType367107' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367107[]' id='answer-id-1430306' class='answer   answerof-367107 ' value='1430306'   \/><label for='answer-id-1430306' id='answer-label-1430306' class=' answer'><span>A tool used to bypass authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367107[]' id='answer-id-1430307' class='answer   answerof-367107 ' value='1430307'   \/><label for='answer-id-1430307' id='answer-label-1430307' class=' answer'><span>A security measure that uses only one factor to authenticate a user<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367107[]' id='answer-id-1430308' class='answer   answerof-367107 ' value='1430308'   \/><label for='answer-id-1430308' id='answer-label-1430308' class=' answer'><span>A security measure that uses multiple factors to authenticate a user<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367107[]' id='answer-id-1430309' class='answer   answerof-367107 ' value='1430309'   \/><label for='answer-id-1430309' id='answer-label-1430309' class=' answer'><span>A tool used to securely store passwords<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-367108'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>What is OpenPGP?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='367108' \/><input type='hidden' id='answerType367108' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367108[]' id='answer-id-1430310' class='answer   answerof-367108 ' value='1430310'   \/><label for='answer-id-1430310' id='answer-label-1430310' class=' answer'><span>An email client for encryption and signing messages.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367108[]' id='answer-id-1430311' class='answer   answerof-367108 ' value='1430311'   \/><label for='answer-id-1430311' id='answer-label-1430311' class=' answer'><span>An open-source implementation of the S\/MIME standard.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367108[]' id='answer-id-1430312' class='answer   answerof-367108 ' value='1430312'   \/><label for='answer-id-1430312' id='answer-label-1430312' class=' answer'><span>An open standard for email encryption and signing using public key cryptography.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367108[]' id='answer-id-1430313' class='answer   answerof-367108 ' value='1430313'   \/><label for='answer-id-1430313' id='answer-label-1430313' class=' answer'><span>A certificate authority (CA) for S\/MIME encryption.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-367109'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>Which of the following terms refers to the deliberate act of accessing, manipulating, or deleting data without authorization?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='367109' \/><input type='hidden' id='answerType367109' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367109[]' id='answer-id-1430314' class='answer   answerof-367109 ' value='1430314'   \/><label for='answer-id-1430314' id='answer-label-1430314' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367109[]' id='answer-id-1430315' class='answer   answerof-367109 ' value='1430315'   \/><label for='answer-id-1430315' id='answer-label-1430315' class=' answer'><span>Encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367109[]' id='answer-id-1430316' class='answer   answerof-367109 ' value='1430316'   \/><label for='answer-id-1430316' id='answer-label-1430316' class=' answer'><span>Phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367109[]' id='answer-id-1430317' class='answer   answerof-367109 ' value='1430317'   \/><label for='answer-id-1430317' id='answer-label-1430317' class=' answer'><span>Hacking<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-367110'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>What device is used to cable network jacks from a wall into a central location for termination into a single punch down block?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='367110' \/><input type='hidden' id='answerType367110' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367110[]' id='answer-id-1430318' class='answer   answerof-367110 ' value='1430318'   \/><label for='answer-id-1430318' id='answer-label-1430318' class=' answer'><span>Router<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367110[]' id='answer-id-1430319' class='answer   answerof-367110 ' value='1430319'   \/><label for='answer-id-1430319' id='answer-label-1430319' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367110[]' id='answer-id-1430320' class='answer   answerof-367110 ' value='1430320'   \/><label for='answer-id-1430320' id='answer-label-1430320' class=' answer'><span>Switch<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367110[]' id='answer-id-1430321' class='answer   answerof-367110 ' value='1430321'   \/><label for='answer-id-1430321' id='answer-label-1430321' class=' answer'><span>Patch panel<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-367111'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>What is a common function of adware?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='367111' \/><input type='hidden' id='answerType367111' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367111[]' id='answer-id-1430322' class='answer   answerof-367111 ' value='1430322'   \/><label for='answer-id-1430322' id='answer-label-1430322' class=' answer'><span>Encrypting data on a system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367111[]' id='answer-id-1430323' class='answer   answerof-367111 ' value='1430323'   \/><label for='answer-id-1430323' id='answer-label-1430323' class=' answer'><span>Stealing sensitive information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367111[]' id='answer-id-1430324' class='answer   answerof-367111 ' value='1430324'   \/><label for='answer-id-1430324' id='answer-label-1430324' class=' answer'><span>Displaying unwanted advertisements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367111[]' id='answer-id-1430325' class='answer   answerof-367111 ' value='1430325'   \/><label for='answer-id-1430325' id='answer-label-1430325' class=' answer'><span>Providing remote access to a system<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-367112'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>What is single sign-on (SSO)?<\/div><input type='hidden' name='question_id[]' id='qID_45' value='367112' \/><input type='hidden' id='answerType367112' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367112[]' id='answer-id-1430326' class='answer   answerof-367112 ' value='1430326'   \/><label for='answer-id-1430326' id='answer-label-1430326' class=' answer'><span>A tool used to securely store and generate passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367112[]' id='answer-id-1430327' class='answer   answerof-367112 ' value='1430327'   \/><label for='answer-id-1430327' id='answer-label-1430327' class=' answer'><span>A tool used to create weak passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367112[]' id='answer-id-1430328' class='answer   answerof-367112 ' value='1430328'   \/><label for='answer-id-1430328' id='answer-label-1430328' class=' answer'><span>A tool used to decrypt passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367112[]' id='answer-id-1430329' class='answer   answerof-367112 ' value='1430329'   \/><label for='answer-id-1430329' id='answer-label-1430329' class=' answer'><span>A tool that allows users to log in to multiple systems with a single set of credentials<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-367113'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>Which of the following is a common source for security incident information and guidance?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='367113' \/><input type='hidden' id='answerType367113' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367113[]' id='answer-id-1430330' class='answer   answerof-367113 ' value='1430330'   \/><label for='answer-id-1430330' id='answer-label-1430330' class=' answer'><span>Computer Emergency Response Team (CERT)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367113[]' id='answer-id-1430331' class='answer   answerof-367113 ' value='1430331'   \/><label for='answer-id-1430331' id='answer-label-1430331' class=' answer'><span>Security incident response plan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367113[]' id='answer-id-1430332' class='answer   answerof-367113 ' value='1430332'   \/><label for='answer-id-1430332' id='answer-label-1430332' class=' answer'><span>Risk assessment report<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367113[]' id='answer-id-1430333' class='answer   answerof-367113 ' value='1430333'   \/><label for='answer-id-1430333' id='answer-label-1430333' class=' answer'><span>IT forensics report<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-367114'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>Your friend complains that they recently installed a new browser extension to help find online discounts. However, since installing it, they have been experiencing an excessive amount of pop-up ads and unrelated advertising banners on web pages. <br \/>\r<br>What type of malware is most likely responsible for these symptoms?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='367114' \/><input type='hidden' id='answerType367114' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367114[]' id='answer-id-1430334' class='answer   answerof-367114 ' value='1430334'   \/><label for='answer-id-1430334' id='answer-label-1430334' class=' answer'><span>Trojan malware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367114[]' id='answer-id-1430335' class='answer   answerof-367114 ' value='1430335'   \/><label for='answer-id-1430335' id='answer-label-1430335' class=' answer'><span>Adware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367114[]' id='answer-id-1430336' class='answer   answerof-367114 ' value='1430336'   \/><label for='answer-id-1430336' id='answer-label-1430336' class=' answer'><span>Ransomware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367114[]' id='answer-id-1430337' class='answer   answerof-367114 ' value='1430337'   \/><label for='answer-id-1430337' id='answer-label-1430337' class=' answer'><span>Spyware<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-367115'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>You work for a large company that has employees who need to access the company network from remote locations. <br \/>\r<br>Which of the following solutions would be the most appropriate for providing secure remote access?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='367115' \/><input type='hidden' id='answerType367115' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367115[]' id='answer-id-1430338' class='answer   answerof-367115 ' value='1430338'   \/><label for='answer-id-1430338' id='answer-label-1430338' class=' answer'><span>An organization-specific VPN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367115[]' id='answer-id-1430339' class='answer   answerof-367115 ' value='1430339'   \/><label for='answer-id-1430339' id='answer-label-1430339' class=' answer'><span>Setting up an open Wi-Fi network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367115[]' id='answer-id-1430340' class='answer   answerof-367115 ' value='1430340'   \/><label for='answer-id-1430340' id='answer-label-1430340' class=' answer'><span>Using plaintext email for communication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367115[]' id='answer-id-1430341' class='answer   answerof-367115 ' value='1430341'   \/><label for='answer-id-1430341' id='answer-label-1430341' class=' answer'><span>Relying on FTP for file transfers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-367116'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>You are using a public Wi-Fi network at a coffee shop to access sensitive information. <br \/>\r<br>What security measure should you take to protect your information?<\/div><input type='hidden' name='question_id[]' id='qID_49' value='367116' \/><input type='hidden' id='answerType367116' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367116[]' id='answer-id-1430342' class='answer   answerof-367116 ' value='1430342'   \/><label for='answer-id-1430342' id='answer-label-1430342' class=' answer'><span>Use a weak password for your accounts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367116[]' id='answer-id-1430343' class='answer   answerof-367116 ' value='1430343'   \/><label for='answer-id-1430343' id='answer-label-1430343' class=' answer'><span>Share your login credentials with others using the same Wi-Fi network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367116[]' id='answer-id-1430344' class='answer   answerof-367116 ' value='1430344'   \/><label for='answer-id-1430344' id='answer-label-1430344' class=' answer'><span>Leave your computer unattended while you step away<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367116[]' id='answer-id-1430345' class='answer   answerof-367116 ' value='1430345'   \/><label for='answer-id-1430345' id='answer-label-1430345' class=' answer'><span>Use a virtual private network (VPN) to encrypt your data<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-367117'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>What is the purpose of The Onion Router (TOR) network?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='367117' \/><input type='hidden' id='answerType367117' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367117[]' id='answer-id-1430346' class='answer   answerof-367117 ' value='1430346'   \/><label for='answer-id-1430346' id='answer-label-1430346' class=' answer'><span>Anonymity and Privacy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367117[]' id='answer-id-1430347' class='answer   answerof-367117 ' value='1430347'   \/><label for='answer-id-1430347' id='answer-label-1430347' class=' answer'><span>Network Monitoring<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367117[]' id='answer-id-1430348' class='answer   answerof-367117 ' value='1430348'   \/><label for='answer-id-1430348' id='answer-label-1430348' class=' answer'><span>Data Storage<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367117[]' id='answer-id-1430349' class='answer   answerof-367117 ' value='1430349'   \/><label for='answer-id-1430349' id='answer-label-1430349' class=' answer'><span>Speed Optimization<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-367118'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>What is one of the primary factors that determines data retention requirements for backups?<\/div><input type='hidden' name='question_id[]' id='qID_51' value='367118' \/><input type='hidden' id='answerType367118' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367118[]' id='answer-id-1430350' class='answer   answerof-367118 ' value='1430350'   \/><label for='answer-id-1430350' id='answer-label-1430350' class=' answer'><span>The cost implications of retaining backup data for extended periods<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367118[]' id='answer-id-1430351' class='answer   answerof-367118 ' value='1430351'   \/><label for='answer-id-1430351' id='answer-label-1430351' class=' answer'><span>The sensitivity of the data being backed up<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367118[]' id='answer-id-1430352' class='answer   answerof-367118 ' value='1430352'   \/><label for='answer-id-1430352' id='answer-label-1430352' class=' answer'><span>The length of time an organization has been in operation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367118[]' id='answer-id-1430353' class='answer   answerof-367118 ' value='1430353'   \/><label for='answer-id-1430353' id='answer-label-1430353' class=' answer'><span>Regulatory requirements and compliance<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-367119'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>What is the purpose of a Public Key Infrastructure (PKI)?<\/div><input type='hidden' name='question_id[]' id='qID_52' value='367119' \/><input type='hidden' id='answerType367119' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367119[]' id='answer-id-1430354' class='answer   answerof-367119 ' value='1430354'   \/><label for='answer-id-1430354' id='answer-label-1430354' class=' answer'><span>To manage private keys<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367119[]' id='answer-id-1430355' class='answer   answerof-367119 ' value='1430355'   \/><label for='answer-id-1430355' id='answer-label-1430355' class=' answer'><span>To manage digital certificates and public keys<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367119[]' id='answer-id-1430356' class='answer   answerof-367119 ' value='1430356'   \/><label for='answer-id-1430356' id='answer-label-1430356' class=' answer'><span>To manage user accounts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367119[]' id='answer-id-1430357' class='answer   answerof-367119 ' value='1430357'   \/><label for='answer-id-1430357' id='answer-label-1430357' class=' answer'><span>To manage encryption algorithms<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-367120'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>Which of the following provides even stronger security through the use of Simultaneous Authentication of Equals (SAE) encryption?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='367120' \/><input type='hidden' id='answerType367120' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367120[]' id='answer-id-1430358' class='answer   answerof-367120 ' value='1430358'   \/><label for='answer-id-1430358' id='answer-label-1430358' class=' answer'><span>WPA3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367120[]' id='answer-id-1430359' class='answer   answerof-367120 ' value='1430359'   \/><label for='answer-id-1430359' id='answer-label-1430359' class=' answer'><span>WPA2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367120[]' id='answer-id-1430360' class='answer   answerof-367120 ' value='1430360'   \/><label for='answer-id-1430360' id='answer-label-1430360' class=' answer'><span>WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367120[]' id='answer-id-1430361' class='answer   answerof-367120 ' value='1430361'   \/><label for='answer-id-1430361' id='answer-label-1430361' class=' answer'><span>WPA<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-367121'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>Which of the following is a characteristic of a secure password?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='367121' \/><input type='hidden' id='answerType367121' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367121[]' id='answer-id-1430362' class='answer   answerof-367121 ' value='1430362'   \/><label for='answer-id-1430362' id='answer-label-1430362' class=' answer'><span>Short length<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367121[]' id='answer-id-1430363' class='answer   answerof-367121 ' value='1430363'   \/><label for='answer-id-1430363' id='answer-label-1430363' class=' answer'><span>No special characters<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367121[]' id='answer-id-1430364' class='answer   answerof-367121 ' value='1430364'   \/><label for='answer-id-1430364' id='answer-label-1430364' class=' answer'><span>Complexity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367121[]' id='answer-id-1430365' class='answer   answerof-367121 ' value='1430365'   \/><label for='answer-id-1430365' id='answer-label-1430365' class=' answer'><span>Infrequent changes<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-367122'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>What are some security risks associated with Smart Devices and IoT networks?<\/div><input type='hidden' name='question_id[]' id='qID_55' value='367122' \/><input type='hidden' id='answerType367122' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367122[]' id='answer-id-1430366' class='answer   answerof-367122 ' value='1430366'   \/><label for='answer-id-1430366' id='answer-label-1430366' class=' answer'><span>Overheating and battery malfunction<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367122[]' id='answer-id-1430367' class='answer   answerof-367122 ' value='1430367'   \/><label for='answer-id-1430367' id='answer-label-1430367' class=' answer'><span>Poor internet connectivity and network lag<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367122[]' id='answer-id-1430368' class='answer   answerof-367122 ' value='1430368'   \/><label for='answer-id-1430368' id='answer-label-1430368' class=' answer'><span>Data breaches and unauthorized access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367122[]' id='answer-id-1430369' class='answer   answerof-367122 ' value='1430369'   \/><label for='answer-id-1430369' id='answer-label-1430369' class=' answer'><span>Display and resolution issues<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-367123'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>What do web browsers check when verifying the validity of an X.509 certificate?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='367123' \/><input type='hidden' id='answerType367123' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367123[]' id='answer-id-1430370' class='answer   answerof-367123 ' value='1430370'   \/><label for='answer-id-1430370' id='answer-label-1430370' class=' answer'><span>subjectAltName<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367123[]' id='answer-id-1430371' class='answer   answerof-367123 ' value='1430371'   \/><label for='answer-id-1430371' id='answer-label-1430371' class=' answer'><span>Expiration date and issuer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367123[]' id='answer-id-1430372' class='answer   answerof-367123 ' value='1430372'   \/><label for='answer-id-1430372' id='answer-label-1430372' class=' answer'><span>Key usage<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367123[]' id='answer-id-1430373' class='answer   answerof-367123 ' value='1430373'   \/><label for='answer-id-1430373' id='answer-label-1430373' class=' answer'><span>Subject<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-367124'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>You want to send a private message to a friend using an instant messaging app. <br \/>\r<br>Which of the following solutions would be the most appropriate for ensuring the privacy of your conversation?<\/div><input type='hidden' name='question_id[]' id='qID_57' value='367124' \/><input type='hidden' id='answerType367124' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367124[]' id='answer-id-1430374' class='answer   answerof-367124 ' value='1430374'   \/><label for='answer-id-1430374' id='answer-label-1430374' class=' answer'><span>TOR<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367124[]' id='answer-id-1430375' class='answer   answerof-367124 ' value='1430375'   \/><label for='answer-id-1430375' id='answer-label-1430375' class=' answer'><span>A proxy server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367124[]' id='answer-id-1430376' class='answer   answerof-367124 ' value='1430376'   \/><label for='answer-id-1430376' id='answer-label-1430376' class=' answer'><span>Transfer encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367124[]' id='answer-id-1430377' class='answer   answerof-367124 ' value='1430377'   \/><label for='answer-id-1430377' id='answer-label-1430377' class=' answer'><span>End-to-end encryption<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-367125'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>What potential issue can arise from using some security tools that mistakenly identify legitimate activities as malicious?<\/div><input type='hidden' name='question_id[]' id='qID_58' value='367125' \/><input type='hidden' id='answerType367125' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367125[]' id='answer-id-1430378' class='answer   answerof-367125 ' value='1430378'   \/><label for='answer-id-1430378' id='answer-label-1430378' class=' answer'><span>False positives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367125[]' id='answer-id-1430379' class='answer   answerof-367125 ' value='1430379'   \/><label for='answer-id-1430379' id='answer-label-1430379' class=' answer'><span>False negatives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367125[]' id='answer-id-1430380' class='answer   answerof-367125 ' value='1430380'   \/><label for='answer-id-1430380' id='answer-label-1430380' class=' answer'><span>Improved detection accuracy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367125[]' id='answer-id-1430381' class='answer   answerof-367125 ' value='1430381'   \/><label for='answer-id-1430381' id='answer-label-1430381' class=' answer'><span>Reduced system performance impact<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-367126'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>Which of the following terms refers to a process of evaluating a system's security posture?<\/div><input type='hidden' name='question_id[]' id='qID_59' value='367126' \/><input type='hidden' id='answerType367126' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367126[]' id='answer-id-1430382' class='answer   answerof-367126 ' value='1430382'   \/><label for='answer-id-1430382' id='answer-label-1430382' class=' answer'><span>Security Audit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367126[]' id='answer-id-1430383' class='answer   answerof-367126 ' value='1430383'   \/><label for='answer-id-1430383' id='answer-label-1430383' class=' answer'><span>CVE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367126[]' id='answer-id-1430384' class='answer   answerof-367126 ' value='1430384'   \/><label for='answer-id-1430384' id='answer-label-1430384' class=' answer'><span>Security assessments<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367126[]' id='answer-id-1430385' class='answer   answerof-367126 ' value='1430385'   \/><label for='answer-id-1430385' id='answer-label-1430385' class=' answer'><span>ISMS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-367127'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>Which of the following is a fraudulent Wi-Fi access point that appears to be legitimate and is used to eavesdrop on wireless communications?<\/div><input type='hidden' name='question_id[]' id='qID_60' value='367127' \/><input type='hidden' id='answerType367127' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367127[]' id='answer-id-1430386' class='answer   answerof-367127 ' value='1430386'   \/><label for='answer-id-1430386' id='answer-label-1430386' class=' answer'><span>Captive portal<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367127[]' id='answer-id-1430387' class='answer   answerof-367127 ' value='1430387'   \/><label for='answer-id-1430387' id='answer-label-1430387' class=' answer'><span>De-authentication attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367127[]' id='answer-id-1430388' class='answer   answerof-367127 ' value='1430388'   \/><label for='answer-id-1430388' id='answer-label-1430388' class=' answer'><span>Karma attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367127[]' id='answer-id-1430389' class='answer   answerof-367127 ' value='1430389'   \/><label for='answer-id-1430389' id='answer-label-1430389' class=' answer'><span>Evil twin<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-367128'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>Which of the following backup types only copies data that has changed since the last backup, regardless of which type of backup it was last performed?<\/div><input type='hidden' name='question_id[]' id='qID_61' value='367128' \/><input type='hidden' id='answerType367128' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367128[]' id='answer-id-1430390' class='answer   answerof-367128 ' value='1430390'   \/><label for='answer-id-1430390' id='answer-label-1430390' class=' answer'><span>Full backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367128[]' id='answer-id-1430391' class='answer   answerof-367128 ' value='1430391'   \/><label for='answer-id-1430391' id='answer-label-1430391' class=' answer'><span>Incremental backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367128[]' id='answer-id-1430392' class='answer   answerof-367128 ' value='1430392'   \/><label for='answer-id-1430392' id='answer-label-1430392' class=' answer'><span>Differential backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367128[]' id='answer-id-1430393' class='answer   answerof-367128 ' value='1430393'   \/><label for='answer-id-1430393' id='answer-label-1430393' class=' answer'><span>Synthetic backup<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-367129'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>Which of the following is a private IPv4 address?<\/div><input type='hidden' name='question_id[]' id='qID_62' value='367129' \/><input type='hidden' id='answerType367129' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367129[]' id='answer-id-1430394' class='answer   answerof-367129 ' value='1430394'   \/><label for='answer-id-1430394' id='answer-label-1430394' class=' answer'><span>2001:0db8:85a3:0000:0000:8a2e:0370:7334<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367129[]' id='answer-id-1430395' class='answer   answerof-367129 ' value='1430395'   \/><label for='answer-id-1430395' id='answer-label-1430395' class=' answer'><span>AC:DE:48:00:11:22<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367129[]' id='answer-id-1430396' class='answer   answerof-367129 ' value='1430396'   \/><label for='answer-id-1430396' id='answer-label-1430396' class=' answer'><span>172.16.0.1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367129[]' id='answer-id-1430397' class='answer   answerof-367129 ' value='1430397'   \/><label for='answer-id-1430397' id='answer-label-1430397' class=' answer'><span>66.23.15.63<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-367130'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>Which of the following is an example of a hybrid encryption scheme?<\/div><input type='hidden' name='question_id[]' id='qID_63' value='367130' \/><input type='hidden' id='answerType367130' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367130[]' id='answer-id-1430398' class='answer   answerof-367130 ' value='1430398'   \/><label for='answer-id-1430398' id='answer-label-1430398' class=' answer'><span>RSA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367130[]' id='answer-id-1430399' class='answer   answerof-367130 ' value='1430399'   \/><label for='answer-id-1430399' id='answer-label-1430399' class=' answer'><span>HTTPS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367130[]' id='answer-id-1430400' class='answer   answerof-367130 ' value='1430400'   \/><label for='answer-id-1430400' id='answer-label-1430400' class=' answer'><span>AES<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367130[]' id='answer-id-1430401' class='answer   answerof-367130 ' value='1430401'   \/><label for='answer-id-1430401' id='answer-label-1430401' class=' answer'><span>SHA-256<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-367131'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>Which of the following is a network of compromised devices used to perform malicious activities?<\/div><input type='hidden' name='question_id[]' id='qID_64' value='367131' \/><input type='hidden' id='answerType367131' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367131[]' id='answer-id-1430402' class='answer   answerof-367131 ' value='1430402'   \/><label for='answer-id-1430402' id='answer-label-1430402' class=' answer'><span>Man in the Middle<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367131[]' id='answer-id-1430403' class='answer   answerof-367131 ' value='1430403'   \/><label for='answer-id-1430403' id='answer-label-1430403' class=' answer'><span>Traffic interception<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367131[]' id='answer-id-1430404' class='answer   answerof-367131 ' value='1430404'   \/><label for='answer-id-1430404' id='answer-label-1430404' class=' answer'><span>DoS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367131[]' id='answer-id-1430405' class='answer   answerof-367131 ' value='1430405'   \/><label for='answer-id-1430405' id='answer-label-1430405' class=' answer'><span>Botnet<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-367132'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>What is email spam?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='367132' \/><input type='hidden' id='answerType367132' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367132[]' id='answer-id-1430406' class='answer   answerof-367132 ' value='1430406'   \/><label for='answer-id-1430406' id='answer-label-1430406' class=' answer'><span>Sensitive information sent via email<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367132[]' id='answer-id-1430407' class='answer   answerof-367132 ' value='1430407'   \/><label for='answer-id-1430407' id='answer-label-1430407' class=' answer'><span>Unsolicited and unwanted email<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367132[]' id='answer-id-1430408' class='answer   answerof-367132 ' value='1430408'   \/><label for='answer-id-1430408' id='answer-label-1430408' class=' answer'><span>Emails from trusted sources<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367132[]' id='answer-id-1430409' class='answer   answerof-367132 ' value='1430409'   \/><label for='answer-id-1430409' id='answer-label-1430409' class=' answer'><span>Encrypted email<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-367133'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>Which protocol is used to translate domain names into IP addresses?<\/div><input type='hidden' name='question_id[]' id='qID_66' value='367133' \/><input type='hidden' id='answerType367133' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367133[]' id='answer-id-1430410' class='answer   answerof-367133 ' value='1430410'   \/><label for='answer-id-1430410' id='answer-label-1430410' class=' answer'><span>DHCP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367133[]' id='answer-id-1430411' class='answer   answerof-367133 ' value='1430411'   \/><label for='answer-id-1430411' id='answer-label-1430411' class=' answer'><span>SMTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367133[]' id='answer-id-1430412' class='answer   answerof-367133 ' value='1430412'   \/><label for='answer-id-1430412' id='answer-label-1430412' class=' answer'><span>802.11<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367133[]' id='answer-id-1430413' class='answer   answerof-367133 ' value='1430413'   \/><label for='answer-id-1430413' id='answer-label-1430413' class=' answer'><span>DNS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-367134'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>Which backup rotation scheme uses a sequence of full, differential, and incremental backups to create a backup history?<\/div><input type='hidden' name='question_id[]' id='qID_67' value='367134' \/><input type='hidden' id='answerType367134' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367134[]' id='answer-id-1430414' class='answer   answerof-367134 ' value='1430414'   \/><label for='answer-id-1430414' id='answer-label-1430414' class=' answer'><span>Tower of Hanoi<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367134[]' id='answer-id-1430415' class='answer   answerof-367134 ' value='1430415'   \/><label for='answer-id-1430415' id='answer-label-1430415' class=' answer'><span>Grandfather-Father-Son<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367134[]' id='answer-id-1430416' class='answer   answerof-367134 ' value='1430416'   \/><label for='answer-id-1430416' id='answer-label-1430416' class=' answer'><span>3-2-1 Backup Rule<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367134[]' id='answer-id-1430417' class='answer   answerof-367134 ' value='1430417'   \/><label for='answer-id-1430417' id='answer-label-1430417' class=' answer'><span>Monthly-Weekly-Daily<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-68' style=';'><div id='questionWrap-68'  class='   watupro-question-id-367135'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>68. <\/span>Which concept ensures that only the intended recipients can read a message?<\/div><input type='hidden' name='question_id[]' id='qID_68' value='367135' \/><input type='hidden' id='answerType367135' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367135[]' id='answer-id-1430418' class='answer   answerof-367135 ' value='1430418'   \/><label for='answer-id-1430418' id='answer-label-1430418' class=' answer'><span>End-to-end encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367135[]' id='answer-id-1430419' class='answer   answerof-367135 ' value='1430419'   \/><label for='answer-id-1430419' id='answer-label-1430419' class=' answer'><span>Transfer encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367135[]' id='answer-id-1430420' class='answer   answerof-367135 ' value='1430420'   \/><label for='answer-id-1430420' id='answer-label-1430420' class=' answer'><span>TOR<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367135[]' id='answer-id-1430421' class='answer   answerof-367135 ' value='1430421'   \/><label for='answer-id-1430421' id='answer-label-1430421' class=' answer'><span>Proxy servers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-69' style=';'><div id='questionWrap-69'  class='   watupro-question-id-367136'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>69. <\/span>Which of the following is a wired network connection commonly used for local area networks?<\/div><input type='hidden' name='question_id[]' id='qID_69' value='367136' \/><input type='hidden' id='answerType367136' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367136[]' id='answer-id-1430422' class='answer   answerof-367136 ' value='1430422'   \/><label for='answer-id-1430422' id='answer-label-1430422' class=' answer'><span>Twisted pair<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367136[]' id='answer-id-1430423' class='answer   answerof-367136 ' value='1430423'   \/><label for='answer-id-1430423' id='answer-label-1430423' class=' answer'><span>Bluetooth<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367136[]' id='answer-id-1430424' class='answer   answerof-367136 ' value='1430424'   \/><label for='answer-id-1430424' id='answer-label-1430424' class=' answer'><span>Fiber optic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367136[]' id='answer-id-1430425' class='answer   answerof-367136 ' value='1430425'   \/><label for='answer-id-1430425' id='answer-label-1430425' class=' answer'><span>Coaxial<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-70' style=';'><div id='questionWrap-70'  class='   watupro-question-id-367137'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>70. <\/span>What is the potential risk of publishing personal information online?<\/div><input type='hidden' name='question_id[]' id='qID_70' value='367137' \/><input type='hidden' id='answerType367137' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367137[]' id='answer-id-1430426' class='answer   answerof-367137 ' value='1430426'   \/><label for='answer-id-1430426' id='answer-label-1430426' class=' answer'><span>Enhanced privacy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367137[]' id='answer-id-1430427' class='answer   answerof-367137 ' value='1430427'   \/><label for='answer-id-1430427' id='answer-label-1430427' class=' answer'><span>Identity theft<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367137[]' id='answer-id-1430428' class='answer   answerof-367137 ' value='1430428'   \/><label for='answer-id-1430428' id='answer-label-1430428' class=' answer'><span>Increased productivity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367137[]' id='answer-id-1430429' class='answer   answerof-367137 ' value='1430429'   \/><label for='answer-id-1430429' id='answer-label-1430429' class=' answer'><span>Improved mental health<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-71' style=';'><div id='questionWrap-71'  class='   watupro-question-id-367138'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>71. <\/span>Which of the following encryption methods is used for email encryption and requires the use of a public key and a private key pair?<\/div><input type='hidden' name='question_id[]' id='qID_71' value='367138' \/><input type='hidden' id='answerType367138' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367138[]' id='answer-id-1430430' class='answer   answerof-367138 ' value='1430430'   \/><label for='answer-id-1430430' id='answer-label-1430430' class=' answer'><span>Certificate Authority<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367138[]' id='answer-id-1430431' class='answer   answerof-367138 ' value='1430431'   \/><label for='answer-id-1430431' id='answer-label-1430431' class=' answer'><span>S\/MIME<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367138[]' id='answer-id-1430432' class='answer   answerof-367138 ' value='1430432'   \/><label for='answer-id-1430432' id='answer-label-1430432' class=' answer'><span>OpenPGP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367138[]' id='answer-id-1430433' class='answer   answerof-367138 ' value='1430433'   \/><label for='answer-id-1430433' id='answer-label-1430433' class=' answer'><span>SMTP STARTTLS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-72' style=';'><div id='questionWrap-72'  class='   watupro-question-id-367139'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>72. <\/span>Which of the following is used to verify the identity of a website?<\/div><input type='hidden' name='question_id[]' id='qID_72' value='367139' \/><input type='hidden' id='answerType367139' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367139[]' id='answer-id-1430434' class='answer   answerof-367139 ' value='1430434'   \/><label for='answer-id-1430434' id='answer-label-1430434' class=' answer'><span>509 digital certificate<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367139[]' id='answer-id-1430435' class='answer   answerof-367139 ' value='1430435'   \/><label for='answer-id-1430435' id='answer-label-1430435' class=' answer'><span>SSL\/TLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367139[]' id='answer-id-1430436' class='answer   answerof-367139 ' value='1430436'   \/><label for='answer-id-1430436' id='answer-label-1430436' class=' answer'><span>Certificate Signing Request (CSR)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367139[]' id='answer-id-1430437' class='answer   answerof-367139 ' value='1430437'   \/><label for='answer-id-1430437' id='answer-label-1430437' class=' answer'><span>Diffie-Hellman key exchange<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-73' style=';'><div id='questionWrap-73'  class='   watupro-question-id-367140'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>73. <\/span>Which of the following is the BEST way to securely procure and install software?<\/div><input type='hidden' name='question_id[]' id='qID_73' value='367140' \/><input type='hidden' id='answerType367140' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367140[]' id='answer-id-1430438' class='answer   answerof-367140 ' value='1430438'   \/><label for='answer-id-1430438' id='answer-label-1430438' class=' answer'><span>Downloading software from an unsecured website<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367140[]' id='answer-id-1430439' class='answer   answerof-367140 ' value='1430439'   \/><label for='answer-id-1430439' id='answer-label-1430439' class=' answer'><span>Purchasing software from an unverified vendor<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367140[]' id='answer-id-1430440' class='answer   answerof-367140 ' value='1430440'   \/><label for='answer-id-1430440' id='answer-label-1430440' class=' answer'><span>Installing software from a USB drive<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367140[]' id='answer-id-1430441' class='answer   answerof-367140 ' value='1430441'   \/><label for='answer-id-1430441' id='answer-label-1430441' class=' answer'><span>Installing software from an app store<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-74' style=';'><div id='questionWrap-74'  class='   watupro-question-id-367141'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>74. <\/span>Which of the following is a network address used to identify devices in layer three of the OSI model?<\/div><input type='hidden' name='question_id[]' id='qID_74' value='367141' \/><input type='hidden' id='answerType367141' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367141[]' id='answer-id-1430442' class='answer   answerof-367141 ' value='1430442'   \/><label for='answer-id-1430442' id='answer-label-1430442' class=' answer'><span>TCP port number<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367141[]' id='answer-id-1430443' class='answer   answerof-367141 ' value='1430443'   \/><label for='answer-id-1430443' id='answer-label-1430443' class=' answer'><span>DNS address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367141[]' id='answer-id-1430444' class='answer   answerof-367141 ' value='1430444'   \/><label for='answer-id-1430444' id='answer-label-1430444' class=' answer'><span>MAC address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367141[]' id='answer-id-1430445' class='answer   answerof-367141 ' value='1430445'   \/><label for='answer-id-1430445' id='answer-label-1430445' class=' answer'><span>IP address<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-75' style=';'><div id='questionWrap-75'  class='   watupro-question-id-367142'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>75. <\/span>What is the purpose of a rootkit?<\/div><input type='hidden' name='question_id[]' id='qID_75' value='367142' \/><input type='hidden' id='answerType367142' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367142[]' id='answer-id-1430446' class='answer   answerof-367142 ' value='1430446'   \/><label for='answer-id-1430446' id='answer-label-1430446' class=' answer'><span>To increase network speed<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367142[]' id='answer-id-1430447' class='answer   answerof-367142 ' value='1430447'   \/><label for='answer-id-1430447' id='answer-label-1430447' class=' answer'><span>To encrypt data on a system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367142[]' id='answer-id-1430448' class='answer   answerof-367142 ' value='1430448'   \/><label for='answer-id-1430448' id='answer-label-1430448' class=' answer'><span>To detect and remove malware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367142[]' id='answer-id-1430449' class='answer   answerof-367142 ' value='1430449'   \/><label for='answer-id-1430449' id='answer-label-1430449' class=' answer'><span>To provide remote access to a system<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-76' style=';'><div id='questionWrap-76'  class='   watupro-question-id-367143'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>76. <\/span>Which of the following is a characteristic of Perfect Forward Secrecy (PFS)?<\/div><input type='hidden' name='question_id[]' id='qID_76' value='367143' \/><input type='hidden' id='answerType367143' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367143[]' id='answer-id-1430450' class='answer   answerof-367143 ' value='1430450'   \/><label for='answer-id-1430450' id='answer-label-1430450' class=' answer'><span>It relies on a single long-term private key for all sessions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367143[]' id='answer-id-1430451' class='answer   answerof-367143 ' value='1430451'   \/><label for='answer-id-1430451' id='answer-label-1430451' class=' answer'><span>It is not used in modern encryption protocols.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367143[]' id='answer-id-1430452' class='answer   answerof-367143 ' value='1430452'   \/><label for='answer-id-1430452' id='answer-label-1430452' class=' answer'><span>It generates a unique session key for each session.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367143[]' id='answer-id-1430453' class='answer   answerof-367143 ' value='1430453'   \/><label for='answer-id-1430453' id='answer-label-1430453' class=' answer'><span>It uses symmetric encryption for all sessions.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-77' style=';'><div id='questionWrap-77'  class='   watupro-question-id-367144'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>77. <\/span>What is an non-disclosure agreement (NDA)?<\/div><input type='hidden' name='question_id[]' id='qID_77' value='367144' \/><input type='hidden' id='answerType367144' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367144[]' id='answer-id-1430454' class='answer   answerof-367144 ' value='1430454'   \/><label for='answer-id-1430454' id='answer-label-1430454' class=' answer'><span>An agreement to not disclose any information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367144[]' id='answer-id-1430455' class='answer   answerof-367144 ' value='1430455'   \/><label for='answer-id-1430455' id='answer-label-1430455' class=' answer'><span>A contract that requires sharing confidential information with others in a business relationship<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367144[]' id='answer-id-1430456' class='answer   answerof-367144 ' value='1430456'   \/><label for='answer-id-1430456' id='answer-label-1430456' class=' answer'><span>An agreement to disclose all information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367144[]' id='answer-id-1430457' class='answer   answerof-367144 ' value='1430457'   \/><label for='answer-id-1430457' id='answer-label-1430457' class=' answer'><span>An agreement to disclose some information<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-78' style=';'><div id='questionWrap-78'  class='   watupro-question-id-367145'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>78. <\/span>What is a major security concern when installing mobile applications from unknown sources?<\/div><input type='hidden' name='question_id[]' id='qID_78' value='367145' \/><input type='hidden' id='answerType367145' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367145[]' id='answer-id-1430458' class='answer   answerof-367145 ' value='1430458'   \/><label for='answer-id-1430458' id='answer-label-1430458' class=' answer'><span>Malware infection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367145[]' id='answer-id-1430459' class='answer   answerof-367145 ' value='1430459'   \/><label for='answer-id-1430459' id='answer-label-1430459' class=' answer'><span>Incompatible hardware components<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367145[]' id='answer-id-1430460' class='answer   answerof-367145 ' value='1430460'   \/><label for='answer-id-1430460' id='answer-label-1430460' class=' answer'><span>Reduced storage capacity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367145[]' id='answer-id-1430461' class='answer   answerof-367145 ' value='1430461'   \/><label for='answer-id-1430461' id='answer-label-1430461' class=' answer'><span>Limited network connectivity<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-79' style=';'><div id='questionWrap-79'  class='   watupro-question-id-367146'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>79. <\/span>What are email spam filters?<\/div><input type='hidden' name='question_id[]' id='qID_79' value='367146' \/><input type='hidden' id='answerType367146' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367146[]' id='answer-id-1430462' class='answer   answerof-367146 ' value='1430462'   \/><label for='answer-id-1430462' id='answer-label-1430462' class=' answer'><span>Filters used to block sensitive information sent via email<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367146[]' id='answer-id-1430463' class='answer   answerof-367146 ' value='1430463'   \/><label for='answer-id-1430463' id='answer-label-1430463' class=' answer'><span>Filters used to block all incoming email<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367146[]' id='answer-id-1430464' class='answer   answerof-367146 ' value='1430464'   \/><label for='answer-id-1430464' id='answer-label-1430464' class=' answer'><span>Filters used to block only unsolicited and unwanted email<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367146[]' id='answer-id-1430465' class='answer   answerof-367146 ' value='1430465'   \/><label for='answer-id-1430465' id='answer-label-1430465' class=' answer'><span>Filters used to block all outgoing email<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-80' style=';'><div id='questionWrap-80'  class='   watupro-question-id-367147'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>80. <\/span>What is end-to-end encryption?<\/div><input type='hidden' name='question_id[]' id='qID_80' value='367147' \/><input type='hidden' id='answerType367147' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367147[]' id='answer-id-1430466' class='answer   answerof-367147 ' value='1430466'   \/><label for='answer-id-1430466' id='answer-label-1430466' class=' answer'><span>A method for optimizing website performance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367147[]' id='answer-id-1430467' class='answer   answerof-367147 ' value='1430467'   \/><label for='answer-id-1430467' id='answer-label-1430467' class=' answer'><span>A software development process<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367147[]' id='answer-id-1430468' class='answer   answerof-367147 ' value='1430468'   \/><label for='answer-id-1430468' id='answer-label-1430468' class=' answer'><span>A type of encryption that protects data as it travels between two endpoints<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367147[]' id='answer-id-1430469' class='answer   answerof-367147 ' value='1430469'   \/><label for='answer-id-1430469' id='answer-label-1430469' class=' answer'><span>A technique for compressing files<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-81' style=';'><div id='questionWrap-81'  class='   watupro-question-id-367148'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>81. <\/span>Which of the following is a security implication of shared access to data in the cloud?<\/div><input type='hidden' name='question_id[]' id='qID_81' value='367148' \/><input type='hidden' id='answerType367148' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367148[]' id='answer-id-1430470' class='answer   answerof-367148 ' value='1430470'   \/><label for='answer-id-1430470' id='answer-label-1430470' class=' answer'><span>Increased risk of unauthorized access to data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367148[]' id='answer-id-1430471' class='answer   answerof-367148 ' value='1430471'   \/><label for='answer-id-1430471' id='answer-label-1430471' class=' answer'><span>Improved data security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367148[]' id='answer-id-1430472' class='answer   answerof-367148 ' value='1430472'   \/><label for='answer-id-1430472' id='answer-label-1430472' class=' answer'><span>Improved data accessibility<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367148[]' id='answer-id-1430473' class='answer   answerof-367148 ' value='1430473'   \/><label for='answer-id-1430473' id='answer-label-1430473' class=' answer'><span>Decreased risk of data loss<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-82' style=';'><div id='questionWrap-82'  class='   watupro-question-id-367149'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>82. <\/span>Which of the following fields in an X.509 certificate identifies the domain name of a website?<\/div><input type='hidden' name='question_id[]' id='qID_82' value='367149' \/><input type='hidden' id='answerType367149' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367149[]' id='answer-id-1430474' class='answer   answerof-367149 ' value='1430474'   \/><label for='answer-id-1430474' id='answer-label-1430474' class=' answer'><span>Issuer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367149[]' id='answer-id-1430475' class='answer   answerof-367149 ' value='1430475'   \/><label for='answer-id-1430475' id='answer-label-1430475' class=' answer'><span>Subject<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367149[]' id='answer-id-1430476' class='answer   answerof-367149 ' value='1430476'   \/><label for='answer-id-1430476' id='answer-label-1430476' class=' answer'><span>Validity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367149[]' id='answer-id-1430477' class='answer   answerof-367149 ' value='1430477'   \/><label for='answer-id-1430477' id='answer-label-1430477' class=' answer'><span>subjectAltName<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-83' style=';'><div id='questionWrap-83'  class='   watupro-question-id-367150'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>83. <\/span>Which of the following concepts is related to the process of verifying a user's identity?<\/div><input type='hidden' name='question_id[]' id='qID_83' value='367150' \/><input type='hidden' id='answerType367150' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367150[]' id='answer-id-1430478' class='answer   answerof-367150 ' value='1430478'   \/><label for='answer-id-1430478' id='answer-label-1430478' class=' answer'><span>Authorization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367150[]' id='answer-id-1430479' class='answer   answerof-367150 ' value='1430479'   \/><label for='answer-id-1430479' id='answer-label-1430479' class=' answer'><span>Digital identity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367150[]' id='answer-id-1430480' class='answer   answerof-367150 ' value='1430480'   \/><label for='answer-id-1430480' id='answer-label-1430480' class=' answer'><span>Authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367150[]' id='answer-id-1430481' class='answer   answerof-367150 ' value='1430481'   \/><label for='answer-id-1430481' id='answer-label-1430481' class=' answer'><span>Accounting<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-84' style=';'><div id='questionWrap-84'  class='   watupro-question-id-367151'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>84. <\/span>What is information classification?<\/div><input type='hidden' name='question_id[]' id='qID_84' value='367151' \/><input type='hidden' id='answerType367151' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367151[]' id='answer-id-1430482' class='answer   answerof-367151 ' value='1430482'   \/><label for='answer-id-1430482' id='answer-label-1430482' class=' answer'><span>The process of deleting information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367151[]' id='answer-id-1430483' class='answer   answerof-367151 ' value='1430483'   \/><label for='answer-id-1430483' id='answer-label-1430483' class=' answer'><span>The process of encrypting information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367151[]' id='answer-id-1430484' class='answer   answerof-367151 ' value='1430484'   \/><label for='answer-id-1430484' id='answer-label-1430484' class=' answer'><span>The process of categorizing information based on its sensitivity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367151[]' id='answer-id-1430485' class='answer   answerof-367151 ' value='1430485'   \/><label for='answer-id-1430485' id='answer-label-1430485' class=' answer'><span>The process of sharing information with others<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-85' style=';'><div id='questionWrap-85'  class='   watupro-question-id-367152'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>85. <\/span>Which protocol provides secure communication over the Internet by encrypting data in transit?<\/div><input type='hidden' name='question_id[]' id='qID_85' value='367152' \/><input type='hidden' id='answerType367152' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367152[]' id='answer-id-1430486' class='answer   answerof-367152 ' value='1430486'   \/><label for='answer-id-1430486' id='answer-label-1430486' class=' answer'><span>SMTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367152[]' id='answer-id-1430487' class='answer   answerof-367152 ' value='1430487'   \/><label for='answer-id-1430487' id='answer-label-1430487' class=' answer'><span>FTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367152[]' id='answer-id-1430488' class='answer   answerof-367152 ' value='1430488'   \/><label for='answer-id-1430488' id='answer-label-1430488' class=' answer'><span>HTTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-367152[]' id='answer-id-1430489' class='answer   answerof-367152 ' value='1430489'   \/><label for='answer-id-1430489' id='answer-label-1430489' class=' answer'><span>HTTPS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-86'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons9250\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"9250\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-04-30 21:04:46\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1777583086\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"367068:1430150,1430151,1430152,1430153 | 367069:1430154,1430155,1430156,1430157 | 367070:1430158,1430159,1430160,1430161 | 367071:1430162,1430163,1430164,1430165 | 367072:1430166,1430167,1430168,1430169 | 367073:1430170,1430171,1430172,1430173 | 367074:1430174,1430175,1430176,1430177 | 367075:1430178,1430179,1430180,1430181 | 367076:1430182,1430183,1430184,1430185 | 367077:1430186,1430187,1430188,1430189 | 367078:1430190,1430191,1430192,1430193 | 367079:1430194,1430195,1430196,1430197 | 367080:1430198,1430199,1430200,1430201 | 367081:1430202,1430203,1430204,1430205 | 367082:1430206,1430207,1430208,1430209 | 367083:1430210,1430211,1430212,1430213 | 367084:1430214,1430215,1430216,1430217 | 367085:1430218,1430219,1430220,1430221 | 367086:1430222,1430223,1430224,1430225 | 367087:1430226,1430227,1430228,1430229 | 367088:1430230,1430231,1430232,1430233 | 367089:1430234,1430235,1430236,1430237 | 367090:1430238,1430239,1430240,1430241 | 367091:1430242,1430243,1430244,1430245 | 367092:1430246,1430247,1430248,1430249 | 367093:1430250,1430251,1430252,1430253 | 367094:1430254,1430255,1430256,1430257 | 367095:1430258,1430259,1430260,1430261 | 367096:1430262,1430263,1430264,1430265 | 367097:1430266,1430267,1430268,1430269 | 367098:1430270,1430271,1430272,1430273 | 367099:1430274,1430275,1430276,1430277 | 367100:1430278,1430279,1430280,1430281 | 367101:1430282,1430283,1430284,1430285 | 367102:1430286,1430287,1430288,1430289 | 367103:1430290,1430291,1430292,1430293 | 367104:1430294,1430295,1430296,1430297 | 367105:1430298,1430299,1430300,1430301 | 367106:1430302,1430303,1430304,1430305 | 367107:1430306,1430307,1430308,1430309 | 367108:1430310,1430311,1430312,1430313 | 367109:1430314,1430315,1430316,1430317 | 367110:1430318,1430319,1430320,1430321 | 367111:1430322,1430323,1430324,1430325 | 367112:1430326,1430327,1430328,1430329 | 367113:1430330,1430331,1430332,1430333 | 367114:1430334,1430335,1430336,1430337 | 367115:1430338,1430339,1430340,1430341 | 367116:1430342,1430343,1430344,1430345 | 367117:1430346,1430347,1430348,1430349 | 367118:1430350,1430351,1430352,1430353 | 367119:1430354,1430355,1430356,1430357 | 367120:1430358,1430359,1430360,1430361 | 367121:1430362,1430363,1430364,1430365 | 367122:1430366,1430367,1430368,1430369 | 367123:1430370,1430371,1430372,1430373 | 367124:1430374,1430375,1430376,1430377 | 367125:1430378,1430379,1430380,1430381 | 367126:1430382,1430383,1430384,1430385 | 367127:1430386,1430387,1430388,1430389 | 367128:1430390,1430391,1430392,1430393 | 367129:1430394,1430395,1430396,1430397 | 367130:1430398,1430399,1430400,1430401 | 367131:1430402,1430403,1430404,1430405 | 367132:1430406,1430407,1430408,1430409 | 367133:1430410,1430411,1430412,1430413 | 367134:1430414,1430415,1430416,1430417 | 367135:1430418,1430419,1430420,1430421 | 367136:1430422,1430423,1430424,1430425 | 367137:1430426,1430427,1430428,1430429 | 367138:1430430,1430431,1430432,1430433 | 367139:1430434,1430435,1430436,1430437 | 367140:1430438,1430439,1430440,1430441 | 367141:1430442,1430443,1430444,1430445 | 367142:1430446,1430447,1430448,1430449 | 367143:1430450,1430451,1430452,1430453 | 367144:1430454,1430455,1430456,1430457 | 367145:1430458,1430459,1430460,1430461 | 367146:1430462,1430463,1430464,1430465 | 367147:1430466,1430467,1430468,1430469 | 367148:1430470,1430471,1430472,1430473 | 367149:1430474,1430475,1430476,1430477 | 367150:1430478,1430479,1430480,1430481 | 367151:1430482,1430483,1430484,1430485 | 367152:1430486,1430487,1430488,1430489\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"367068,367069,367070,367071,367072,367073,367074,367075,367076,367077,367078,367079,367080,367081,367082,367083,367084,367085,367086,367087,367088,367089,367090,367091,367092,367093,367094,367095,367096,367097,367098,367099,367100,367101,367102,367103,367104,367105,367106,367107,367108,367109,367110,367111,367112,367113,367114,367115,367116,367117,367118,367119,367120,367121,367122,367123,367124,367125,367126,367127,367128,367129,367130,367131,367132,367133,367134,367135,367136,367137,367138,367139,367140,367141,367142,367143,367144,367145,367146,367147,367148,367149,367150,367151,367152\";\nWatuPROSettings[9250] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 9250;\t    \nWatuPRO.post_id = 93601;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.61601000 1777583086\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(9250);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>We introduced the 020-100 dumps in our article, \u201cReal 020-100 Exam Dumps &#8211; An Effective Way to Prepare for Your Lpi Security Essentials 020-100 Exam\u201d. We guarantee that you can pass your 020-100 exam with our dumps. DumpsBase\u2019s 020-100 dumps (V8.02) contain 228 practice exam questions and answers. These Q&amp;As are crafted and verified by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[390,17985],"tags":[17986,17987],"class_list":["post-93601","post","type-post","status-publish","format-standard","hentry","category-lpi","category-security-essentials","tag-020-100-exam-dumps","tag-lpi-security-essentials"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/93601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=93601"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/93601\/revisions"}],"predecessor-version":[{"id":93604,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/93601\/revisions\/93604"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=93601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=93601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=93601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}