CISSP Question of the Week: Biometric System and Fingerprinting Technology
Why should an organization not deploy a biometric system based on fingerprinting technology?
Read moreWhy should an organization not deploy a biometric system based on fingerprinting technology?
Read moreBob manages the sales department. Most of his sales representatives travel among several client sites. He wants to enable these sales representatives to check the shipping status of their orders online. This information currently resides on the company intranet, but it is not accessible to anyone outside the company firewall. Bob has asked you to accomplish this. You decide to create an extranet to allow these employees to view their customers’ order status and history. Which technique could you use to secure communications between network segments sending order-status data via the Internet?
Read moreWhich OSI layer is responsible for formatting data?
Read moreYou need to decrypt a file that is encrypted using asymmetric encryption. What should be used to decrypt the file?
Read moreWhile completing the business impact analysis, the committee discovers that a human resources application relies on two servers (human resources server managed by the human resources department in San Antonio, Texas and a database server managed by the IT department in San Antonio, Texas). At the suggestion of the business continuity plan committee, management decides to implement redundant servers for both of these servers and place the redundant servers in the branch office in Seattle, Washington. What are the two new servers an example of?
Read more