A network administrator is following best practices to implement firewalls, patch management and policies on the network. Which of the following should be performed to verify the security controls in place?

A. Penetration testing
B. AAA authentication testing
C. Disaster recovery testing
D. Single point of failure testing


Answer: A. Penetration testing

Computer Science & Information Technology

You might also like to view...

MC Polymorphism is the ability for objects of______.

a) different classes to respond differently to the same message. b) the same class to respond to a single message. c) different classes to respond similarly to the same message. d) None of the above.

Computer Science & Information Technology

What is the output of the following segment of code if the value 4 is input by the user?

``` int num; int total = 0; cout << "Enter a number from 1 to 10: "; cin >> num; switch (num) { case 1: case 2: total = 5; case 3: total = 10; case 4: total = total + 3; case 8: total = total + 6; default: total = total + 4; } cout << total << endl; ``` a. 0 b. 3 c. 13 d. 23 e. None of these

Computer Science & Information Technology

Columns containing non-essential data can be ________

A) deleted B) hidden C) ignored D) omitted

Computer Science & Information Technology

Which of the following is not one of the categories that the Accessibility checker will assign to any issues it finds?

A) Suggestion B) Warning C) Tip D) Error

Computer Science & Information Technology