Uncategorized

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Tom would like to send an encrypted message to Jerry using asymmetric cryptography. What key should Tom use to encrypt the message? A. His public key B. His private key C. Jerry’s public key D. Jerry’s private key Correct Answer: C When encrypting a message with asymmetric cryptography, the sender of the message always encrypts it using the recipient's own public key. The recipient being Jerry, can then decrypt the message using his own private key. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Which one of the following techniques is most likely to enable an attacker to engage in a man-in-the-middle attack, assuming that the attacker has access to the victim's local network? A. ARP spoofing B. Cross Site Scripting C. Buffer Overflow D. Directory Traversal Correct Answer: A By conducting an ARP spoofing attack, the attacker may fool the victim into thinking that a system controlled by the attacker is the local router or another piece of network infrastructure. They may then route traffic from that victim through their device, eavesdropping on communications and potentially engaging in a man-in-the-middle attack. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Alan is working with a cloud provider to implement a new service that places IoT sensors at the edge of his network, allowing those devices to perform some computation locally, and then connects those devices to the cloud provider. What term best describes this approach? A. Hybrid Cloud Computing B. Fog Computing C. Public Cloud Computing D. Private Cloud Computing Correct Answer: B This scenario does not give us enough information to determine whether the cloud provider is performing computation in a public cloud or private cloud model. So neither public or private cloud computing is our correct answer here. This approach, which mixes the local computation on edge devices with the use of a remote cloud offering, is known as fog computing, making it our correct answer. There is also no indication that the customer site has a cloud environment in this scenario. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...