Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?A . WalkthroughB . SimulationC . ParallelD . White boxView AnswerAnswer: C
Which of the following is a PRIMARY advantage of using a third-party identity service?
Which of the following is a PRIMARY advantage of using a third-party identity service?A . Consolidation of multiple providersB . Directory synchronizationC . Web based logonD . Automated account managementView AnswerAnswer: D
Alternate encoding such as hexadecimal representations is MOST often observed in which of the following forms of attack?
Alternate encoding such as hexadecimal representations is MOST often observed in which of the following forms of attack?A . SmurfB . Rootkit exploitC . Denial of Service (DoS)D . Cross site scripting (XSS)View AnswerAnswer: D
In which of the following programs is it MOST important to include the collection of security process data?
Topic 6, . Security Assessment and Testing In which of the following programs is it MOST important to include the collection of security process data?A . Quarterly access reviewsB . Security continuous monitoringC . Business continuity testingD . Annual security trainingView AnswerAnswer: B
Which of the following mobile code security models relies only on trust?
Which of the following mobile code security models relies only on trust?A . Code signingB . Class authenticationC . SandboxingD . Type safetyView AnswerAnswer: A
What is the MOST probable security feature of Java preventing the program from operating as intended?
Topic 8, . Software Development Security A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected. What is the MOST probable security feature of Java preventing the program from...
What MUST an administrator review to audit a user’s access to data files?
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?A . Host VM monitor audit logsB . Guest OS access controlsC . Host VM access controlsD . Guest OS audit logsView AnswerAnswer:...
Which of the following is an attacker MOST likely to target to gain privileged access to a system?
Which of the following is an attacker MOST likely to target to gain privileged access to a system?A . Programs that write to system resourcesB . Programs that write to user directoriesC . Log files containing sensitive informationD . Log files containing system callsView AnswerAnswer: A
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?A . Audit logsB . Role-Based Access Control (RBAC)C . Two-factor authenticationD . Application of least privilegeView AnswerAnswer: B
Which of the following is the BEST method to prevent malware from being introduced into a production environment?
Which of the following is the BEST method to prevent malware from being introduced into a production environment?A . Purchase software from a limited list of retailersB . Verify the hash key or certificate key of all updatesC . Do not permit programs, patches, or updates from the InternetD ....