Podcast Beta
Questions and Answers
What is the Single Loss Expectancy (SLE) if the Annualized Loss Occurrence is $120,000 and the Anticipated Rate of Occurrence (ARO) is once every 10 years?
Which of the following is NOT a type of risk strategy mentioned in the text?
When assigning permissions to users, which principle should you follow?
If a system is designed to fool attackers into thinking it is unsecured, what is it called?
Signup and view all the answers
What is the purpose of Separation of Duties policies?
Signup and view all the answers
If a fire that might damage an asset occurs once every 20 years and the asset's value would be $10,000 in parts if damaged, what would be the Annualized Loss Expectancy (ALE) for this asset?
Signup and view all the answers
Which layer of the TCP/IP model does the Telnet protocol operate on?
Signup and view all the answers
If you wanted to connect two networks securely over the Internet, what type of technology could you use?
Signup and view all the answers
Which access control model uses predefined access privileges assigned by the administrator?
Signup and view all the answers
What authentication method uses a Key Distribution Center (KDC)?
Signup and view all the answers
Which of the following is an access control method model that grants rights based on job function or position held?
Signup and view all the answers
What method is used for a 'victim' to learn attack methods without compromising a live system?
Signup and view all the answers
To run 'sniffer' software properly, what mode must the NIC in the computer running the software be set to?
Signup and view all the answers
What is used to monitor a network for suspect activity?
Signup and view all the answers
What is a message from the analyzer indicating that an event of interest has occurred?
Signup and view all the answers
What is the remote access protocol, almost exclusively implemented by Cisco, that involves a central server providing remote access usernames for dial-up users?
Signup and view all the answers
Which of the following is a passive method of threat response?
Signup and view all the answers
Which Evaluation Assurance Level (EAL) indicates that the user seeks assurance for correct system operation but does not consider security threats as serious?
Signup and view all the answers
Which port should be closed on systems to prevent unauthorized running of programs?
Signup and view all the answers
Which IEEE standard is followed by Wireless Ethernet?
Signup and view all the answers
What security layer is used for wireless 802.11 connections with WAP?
Signup and view all the answers
In what kind of attack does a rogue wireless access point pretend to be a legitimate wireless service provider to intercept user-transmitted information?
Signup and view all the answers
Which hypervisor model requires the operating system to be up and running before it can boot?
Signup and view all the answers
What type of security attack is a result of the trusting nature of human beings?
Signup and view all the answers
In computer room humidity management, what is the ideal percentage that should be maintained?
Signup and view all the answers
What is used to provide EMI & RFI shielding for an entire room of computer or electronic equipment?
Signup and view all the answers
Which type of fire extinguisher is best suited for extinguishing a computer fire?
Signup and view all the answers
Locking the door(s) to the server room involves what kind of security?
Signup and view all the answers
Which of the following is NOT a goal of information security?
Signup and view all the answers