Podcast
Questions and Answers
All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that
All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that
Which of the following actions will reduce risk to a laptop before traveling to a high-risk area?
Which of the following actions will reduce risk to a laptop before traveling to a high-risk area?
A company whose Information Technology (IT) services are being delivered from a Tier 4 data centre, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?
A company whose Information Technology (IT) services are being delivered from a Tier 4 data centre, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?
Which of the following represents the GREATEST risk to data confidentiality?
Which of the following represents the GREATEST risk to data confidentiality?
Signup and view all the answers
What is the MOST important consideration from a data security perspective when an organization plans to relocate?
What is the MOST important consideration from a data security perspective when an organization plans to relocate?
Signup and view all the answers
International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?
International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?
Signup and view all the answers
Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?
Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?
Signup and view all the answers
Which of the following is MOST important when assigning ownership of an asset to a department?
Which of the following is MOST important when assigning ownership of an asset to a department?
Signup and view all the answers
Which one of the following affects the classification of data?
Which one of the following affects the classification of data?
Signup and view all the answers
An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations and has a backlog of account management requests.
Which contract is BEST in offloading the task from the IT staff?
An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations and has a backlog of account management requests. Which contract is BEST in offloading the task from the IT staff?
Signup and view all the answers
In a data classification scheme, the data is owned by the
In a data classification scheme, the data is owned by the
Signup and view all the answers
Which of the following is an initial consideration when developing an information security management system?
Which of the following is an initial consideration when developing an information security management system?
Signup and view all the answers
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?
Signup and view all the answers
Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?
Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?
Signup and view all the answers
Who in the organization is accountable for classification of data information assets?
Who in the organization is accountable for classification of data information assets?
Signup and view all the answers
The use of private and public encryption keys is fundamental in the implementation of which of the following?
The use of private and public encryption keys is fundamental in the implementation of which of the following?
Signup and view all the answers
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?
Signup and view all the answers
In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?
In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?
Signup and view all the answers
Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?
Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?
Signup and view all the answers
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
Signup and view all the answers
An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?
An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?
Signup and view all the answers
Which of the following is the BEST network defence against unknown types of attacks or stealth attacks in progress?
Which of the following is the BEST network defence against unknown types of attacks or stealth attacks in progress?
Signup and view all the answers
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
Signup and view all the answers
An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?
An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?
Signup and view all the answers
Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?
Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?
Signup and view all the answers
Which one of the following transmission media is MOST effective in preventing data interception?
Which one of the following transmission media is MOST effective in preventing data interception?
Signup and view all the answers
Which security action should be taken FIRST when computer personnel are terminated from their jobs?
Which security action should be taken FIRST when computer personnel are terminated from their jobs?
Signup and view all the answers
The type of authorized interactions a subject can have with an object is
The type of authorized interactions a subject can have with an object is
Signup and view all the answers
Why MUST a Kerberos server be well protected from unauthorized access?
Why MUST a Kerberos server be well protected from unauthorized access?
Signup and view all the answers
Which one of the following effectively obscures network addresses from external exposure when implemented on a firewall or router?
Which one of the following effectively obscures network addresses from external exposure when implemented on a firewall or router?
Signup and view all the answers
While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?
While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?
Signup and view all the answers
Why must all users be positively identified prior to using multi-user computers?
Why must all users be positively identified prior to using multi-user computers?
Signup and view all the answers
An advantage of link encryption in a communications network is that it
An advantage of link encryption in a communications network is that it
Signup and view all the answers
What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?
What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?
Signup and view all the answers
The PRIMARY purpose of a security awareness program is to
The PRIMARY purpose of a security awareness program is to
Signup and view all the answers
The process of mutual authentication involves a computer system authenticating a user and authenticating the
The process of mutual authentication involves a computer system authenticating a user and authenticating the
Signup and view all the answers
The FIRST step in building a firewall is to
The FIRST step in building a firewall is to
Signup and view all the answers
A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority.
To which of the following might this system have been subjected?
A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?
Signup and view all the answers
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?
Signup and view all the answers
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?
Signup and view all the answers
What is the PRIMARY reason for implementing change management?
What is the PRIMARY reason for implementing change management?
Signup and view all the answers
What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?
What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?
Signup and view all the answers
What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?
What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?
Signup and view all the answers
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?
Signup and view all the answers
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?
Signup and view all the answers
Which of the following is the PRIMARY risk with using open-source software in a commercial software construction?
Which of the following is the PRIMARY risk with using open-source software in a commercial software construction?
Signup and view all the answers
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
Signup and view all the answers
Which of the following is the BEST method to prevent malware from being introduced into a production environment?
Which of the following is the BEST method to prevent malware from being introduced into a production environment?
Signup and view all the answers
Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?
Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?
Signup and view all the answers
What is the MOST effective countermeasure to a malicious code attack against a mobile system?
What is the MOST effective countermeasure to a malicious code attack against a mobile system?
Signup and view all the answers
Which of the following is ensured when hashing files during chain of custody handling?
Which of the following is ensured when hashing files during chain of custody handling?
Signup and view all the answers
Which of the following statements is TRUE of black box testing?
Which of the following statements is TRUE of black box testing?
Signup and view all the answers
Study Notes
No Topic Provided
- Insufficient information to generate study notes. Please provide the text or questions.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.