|
Question |
Rating |
View Answer |
 |
Which of the following are common failures that should be addressed in an organization's Business Continuity Plan (BCP) ? (Choose THREE.) A. Connectivity failures B. Accounting failures C. Hardware failures D. Utility failures E. Personal failures
|
|
View Answer |
 |
Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.) A. Authentication B. Secure key-exchange mechanisms C. Public Web site access D. Data-integrity checking E. Sneaker net
|
|
View Answer |
 |
A _______ attack uses multiple systems to launch a coordinated attack. A. Distributed denial-of-service B. Teardrop C. Birthday D. FTP Bounce E. Salami
|
|
View Answer |
 |
Which of the following equations results in the Single Loss Expectancy for an asset? A. Asset Value x % Of Loss From Realized Exposure B. Asset Value x % Of Loss From Realized Threat C. Annualized Rate of Occurrence / Annualized Loss Expectancy D. Asset Value x % Of Loss From Realized Vulnerability E. Annualized Rate of Occurrence x Annualized Loss Expectancy
|
|
View Answer |
 |
Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.) A. False Rejection Rate B. User Acceptance Rate C. Crossover Error Rate D. False Acceptance Rate E. Enrollment Failure Rate
|
|
View Answer |
 |
You are a system administrator managing a pool of database servers. Your software vendor releases a service pack, with many new features. What should you do? (Choose TWO.) A. Eliminate the testing phase of change control. B. Read the release notes. C. Refuse to install the service pack. D. Install the service pack on all production database servers. E. Install the service pack on a database server, in a test environment.
|
|
View Answer |
 |
A(n) _______________ is an unintended communication path that can be used to violate a system security policy. A. Covert channel B. Integrity axiom C. Simple rule violation D. Inferred fact
|
|
View Answer |
 |
_________ is a smaller, enhanced version of the X.500 protocol. It is used to provide directory- service information. (Choose the BEST answer.) A. Lightweight Directory Access Protocol B. X.400 Directory Access Protocol C. Access control list D. Lightweight Host Configuration Protocol E. Role-based access control
|
|
View Answer |
 |
Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating system. A. Sequence Verifier B. Initial sequence number C. Address spoofing D. Time to Live E. IP ID field
|
|
View Answer |
 |
Which of the following entities review partner-extranet requirements? A. Information systems B. Shipping and receiving C. Marketing D. Requesting department E. Chief Information Officer
|
|
View Answer |
 |
A security administrator implements Secure Configuration Verification (SCV), because SCV: (Choose THREE.) A. Does not enable the administrator to monitor the configuration of remote computers. B. Can block connectivity for machines that do not comply with the organization's security policy. C. Enables the administrator to monitor the configuration of remote computers. D. Prevents attackers from penetrating headquarters' Security Gateway. E. Confirms that a remote configuration complies with the organization's security policy.
|
|
View Answer |
 |
Which of the following can be stored on a workstation? (Choose TWO.) A. Payroll information B. Data objects used by many employees C. Databases D. Interoffice memo E. Customer correspondence
|
|
View Answer |
 |
Digital signatures are typically provided by a ____________________, where a third party verifies a key's authenticity. A. Network firewall B. Security administrator C. Domain controller D. Certificate Authority E. Hash function
|
|
View Answer |
 |
Which TWO of the following items should be accomplished, when interviewing candidates for a position within an organization? A. Hire an investigation agency to run background checks. B. Verify all dates of previous employment. C. Question candidates, using polygraphs. D. Contact personal and professional references. E. Run criminal-background checks.
|
|
View Answer |
 |
Which of these choices correctly describe denial-of-service (DoS) attacks? (Choose THREE.) A. DoS attacks do not require attackers to have any privileges on a target system. B. DoS attacks are nearly impossible to stop, once they begin. C. DoS attacks free the target system of excessive overhead. D. DoS ties up a system with so many requests, system resources are consumed, and performance degrades. E. DoS attacks cause the attacked system to accept legitimate access requests.
|
|
View Answer |
 |
Which type of Business Continuity Plan (BCP) test involves practicing aspects of the BCP, without actually interrupting operations or bringing an alternate site on-line? A. Structured walkthrough B. Checklist C. Simulation D. Full interruption E. Parallel
|
|
View Answer |
 |
Which of the following is likely in a small-business environment? A. Most small businesses employ a full-time information-technology staff. B. Resources are available as needed. C. Small businesses have security personnel on staff. D. Most employees have experience with information security. E. Security budgets are very small.
|
|
View Answer |
 |
What type of document contains information on alternative business locations, IT resources, and personnel? A. End-user license agreement B. Nondisclosure agreement C. Acceptable use policy D. Security policy E. Business continuity plan
|
|
View Answer |
 |
____________________ is the state of being correct, or the degree of certainty a person or process can have, that the data in an information asset is correct. A. Confidentiality B. Integrity C. Authenticity D. Privacy E. Availability
|
|
View Answer |
 |
One individual is selected from each department, to attend a security-awareness course. Each person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this? A. On-line training B. Formal classroom training C. Train-the-mentor training D. Alternating-facilitator training E. Self-paced training
|
|
View Answer |