Podcast
Questions and Answers
Which statement BEST describes the behavior of the engineer who created the virus creation tool?
Which statement BEST describes the behavior of the engineer who created the virus creation tool?
- The behavior is ethical because the tool will be used to create a better virus scanner. (correct)
- The behavior is not ethical because creating any kind of virus is bad.
- The behavior is not ethical because such a tool could be leaked on the Internet.
- The behavior is ethical because any experienced programmer could create such a tool.
Which technology effectively obscures network addresses from external exposure when implemented on a firewall or router?
Which technology effectively obscures network addresses from external exposure when implemented on a firewall or router?
- Address Masking
- Network Address Translation (NAT) (correct)
- Routing Information Protocol (RIP) Version 2
- Application Proxy
In a non-climate controlled environment, what should Passive Infrared Sensors (PIR) do?
In a non-climate controlled environment, what should Passive Infrared Sensors (PIR) do?
- Automatically compensate for variance in background temperature. (correct)
- Detect objects of a specific temperature independent of the background temperature.
- Reduce the detected object temperature in relation to the background temperature.
- Increase the detected object temperature in relation to the background temperature.
What is a federated identity standard?
What is a federated identity standard?
What is the main influence on designing an organization's electronic monitoring policies?
What is the main influence on designing an organization's electronic monitoring policies?
For configuring a Domain Name Service (DNS) system, what is a best practice from a security perspective?
For configuring a Domain Name Service (DNS) system, what is a best practice from a security perspective?
What is the primary basis for application access in a large organization according to the given information?
What is the primary basis for application access in a large organization according to the given information?
Which option is NOT recommended for configuring a DNS system securely?
Which option is NOT recommended for configuring a DNS system securely?
What technology is used by the large organization for access control based on the provided information?
What technology is used by the large organization for access control based on the provided information?
What is an attacker MOST likely to target to gain privileged access to a system?
What is an attacker MOST likely to target to gain privileged access to a system?
Which is the MOST effective countermeasure to a malicious code attack against a mobile system?
Which is the MOST effective countermeasure to a malicious code attack against a mobile system?
What transmission media is MOST effective in preventing data interception?
What transmission media is MOST effective in preventing data interception?
Which factor increases the level of vulnerability to physical threats when building a data center?
Which factor increases the level of vulnerability to physical threats when building a data center?
What does the Encapsulating Security Payload (ESP) provide?
What does the Encapsulating Security Payload (ESP) provide?
Which type of construction factor can increase the security level of a data center?
Which type of construction factor can increase the security level of a data center?
What is a recommended measure for enhancing security during a user session?
What is a recommended measure for enhancing security during a user session?
Why might a customer transaction be kept beyond the retention schedule?
Why might a customer transaction be kept beyond the retention schedule?
What type of security control is exemplified by using a proximity card to access a building?
What type of security control is exemplified by using a proximity card to access a building?
What is the most effective method for preventing e-mail spoofing?
What is the most effective method for preventing e-mail spoofing?
Why would a security practitioner need a plan to address client-based attacks?
Why would a security practitioner need a plan to address client-based attacks?
Which principle requires that changes to the plaintext affect many parts of the ciphertext?
Which principle requires that changes to the plaintext affect many parts of the ciphertext?
In terms of information classification, what should be the first step in the process?
In terms of information classification, what should be the first step in the process?
What is the primary purpose of testing a Disaster Recovery Plan (DRP)?
What is the primary purpose of testing a Disaster Recovery Plan (DRP)?
When computer personnel are terminated, what should be the FIRST security action taken?
When computer personnel are terminated, what should be the FIRST security action taken?
When should re-authentication be required in a user session according to best practices?
When should re-authentication be required in a user session according to best practices?
Which type of control recognizes excessive transaction amounts according to corporate policy?
Which type of control recognizes excessive transaction amounts according to corporate policy?
Flashcards are hidden until you start studying