Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?A . Packet filteringB . Port services filteringC . Content filteringD . Application access controlView AnswerAnswer: A
In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?
In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?A . CommunicationB . PlanningC . RecoveryD . EscalationView AnswerAnswer: A
Which one of the following affects the classification of data?
Which one of the following affects the classification of data?A . Assigned security labelB . Multilevel Security (MLS) architectureC . Minimum query sizeD . Passage of timeView AnswerAnswer: D
The key benefits of a signed and encrypted e-mail include
The key benefits of a signed and encrypted e-mail includeA . confidentiality, authentication, and authorization.B . confidentiality, non-repudiation, and authentication.C . non-repudiation, authorization, and authentication.D . non-repudiation, confidentiality, and authorization.View AnswerAnswer: B
Which contract is BEST in offloading the task from the IT staff?
An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations...
Which of the following is the FIRST action that a system administrator should take when it is revealed during a penetration test that everyone in an organization has unauthorized access to a server holding sensitive data?
Which of the following is the FIRST action that a system administrator should take when it is revealed during a penetration test that everyone in an organization has unauthorized access to a server holding sensitive data?A . Immediately document the finding and report to senior management.B . Use system privileges...
Which of the following is a potential risk when a program runs in privileged mode?
Which of the following is a potential risk when a program runs in privileged mode?A . It may serve to create unnecessary code complexityB . It may not enforce job separation dutiesC . It may create unnecessary application hardeningD . It may allow malicious code to be insertedView AnswerAnswer: D
Which of the following is MOST suited to quickly implement a control?
An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?A . Add a new rule to the application layer firewallB . Block access to the serviceC . Install an Intrusion Detection System (IDS)D...
The use of private and public encryption keys is fundamental in the implementation of which of the following?
The use of private and public encryption keys is fundamental in the implementation of which of the following?A . Diffie-Hellman algorithmB . Secure Sockets Layer (SSL)C . Advanced Encryption Standard (AES)D . Message Digest 5 (MD5)View AnswerAnswer: B
Why MUST a Kerberos server be well protected from unauthorized access?
Why MUST a Kerberos server be well protected from unauthorized access?A . It contains the keys of all clients.B . It always operates at root privilege.C . It contains all the tickets for services.D . It contains the Internet Protocol (IP) address of all network entities.View AnswerAnswer: A