You are your company's security analyst. Management has allocated funds for you to attend one conference this year. You have been asked to focus on a conference that will most improve your security knowledge. The conference needs to include training on the latest hacking techniques. Which of the following conferences should be among those that you research? (Choose all that apply.)
A. ISSA
B. DEFCON
C. RSA Conference
D. Black Hat Conference
B,C,D
Explanation: You should research DEFCON, RSA Conference, and Black Hat Conference. Select the conference that best fits your needs as a security analyst.
ISSA is focused on developing security personnel and doesn't offer as much on hacking as the other options.
You might also like to view...
Which of the following statements restores the default fill character?
a. cout.defaultFill(); b. cout.fill(); c. cout.fill( 0 ); d. cout.fill( ' ' );
Specifying _______ as a parameter to Peedy’s Play method causes him to rest.
a) "RestPose" b) "Rest" c) "Think" d) "Pose"
Which of the following is NOT an example of a download?
A. Putting pictures from the Internet on your hard drive. B. Storing a map for your vacation from the Internet on your hard drive. C. Saving a presentation to a CD. D. Saving a program from an Internet site to your hard drive.
A technician observes that the lights in a customers building flicker periodically during the course of the day. Which of the following should the technician recommend to protect the customer's equipment?
A. A power supply B. A generator C. A heavy duty electrical cord D. A UPS