A network-based vulnerability assessment is a type of test also referred to as:

A network-based vulnerability assessment is a type of test also referred to as:A .  An active vulnerability assessment.B .  A routing vulnerability assessment.C .  A host-based vulnerability assessment.D .  A passive vulnerability assessment.View AnswerAnswer: A Explanation: A network-based vulnerability assessment tool/system either re-enacts system attacks, noting and recording responses to the...

November 17, 2018 No Comments READ MORE +

Which of the following describes a computer processing architecture in which a language compiler or pre-processor breaks program instructions down into basic operations that can be performed by the processor at the same time?

Which of the following describes a computer processing architecture in which a language compiler or pre-processor breaks program instructions down into basic operations that can be performed by the processor at the same time?A .  Very-Long Instruction-Word Processor (VLIW)B .  Complex-Instruction-Set-Computer (CISC)C .  Reduced-Instruction-Set-Computer (RISC)D .  Super Scalar Processor Architecture...

November 17, 2018 No Comments READ MORE +

Which of the following is the MOST important aspect relating to employee termination?

Which of the following is the MOST important aspect relating to employee termination?A .  The details of employee have been removed from active payroll files.B .  Company property provided to the employee has been returned.C .  User ID and passwords of the employee have been deleted.D .  The appropriate company...

November 17, 2018 No Comments READ MORE +

Which of the following security models does NOT concern itself with the flow of data?

Which of the following security models does NOT concern itself with the flow of data?A .  The information flow modelB .  The Biba modelC .  The Bell-LaPadula modelD .  The noninterference modelView AnswerAnswer: D Explanation: The goal of a noninterference model is to strictly separate differing security levels to assure...

November 16, 2018 No Comments READ MORE +

A trusted system does NOT involve which of the following?

A trusted system does NOT involve which of the following?A .  Enforcement of a security policy.B .  Sufficiency and effectiveness of mechanisms to be able to enforce a security policy.C .  Assurance that the security policy can be enforced in an efficient and reliable manner.D .  Independently-verifiable evidence that the...

November 15, 2018 No Comments READ MORE +

What is the primary role of smartcards in a PKI?

What is the primary role of smartcards in a PKI?A .  Transparent renewal of user keysB .  Easy distribution of the certificates between the usersC .  Fast hardware encryption of the raw dataD .  Tamper resistant, mobile storage and application of private keys of the usersView AnswerAnswer: D Explanation: HARRIS,...

November 13, 2018 No Comments READ MORE +

Which of the following floors would be most appropriate to locate information processing facilities in a 6-stories building?

Which of the following floors would be most appropriate to locate information processing facilities in a 6-stories building?A .  BasementB .  Ground floorC .  Third floorD .  Sixth floorView AnswerAnswer: C Explanation: You data center should be located in the middle of the facility or the core of a building to provide...

November 13, 2018 No Comments READ MORE +

The Orange Book is founded upon which security policy model?

The Orange Book is founded upon which security policy model?A .  The Biba ModelB .  The Bell LaPadula ModelC .  Clark-Wilson ModelD .  TEMPESTView AnswerAnswer: B Explanation: From the glossary of Computer Security Basics: The Bell-LaPadula model is the security policy model on which the Orange Book requirements are based....

November 12, 2018 No Comments READ MORE +

What is a common problem when using vibration detection devices for perimeter control?

What is a common problem when using vibration detection devices for perimeter control?A .  They are vulnerable to non-adversarial disturbances.B .  They can be defeated by electronic means.C .  Signal amplitude is affected by weather conditions.D .  They must be buried below the frost line.View AnswerAnswer: A Explanation: Vibration sensors are...

November 11, 2018 No Comments READ MORE +

When a biometric system is used, which error type deals with the possibility of GRANTING access to impostors who should be REJECTED?

When a biometric system is used, which error type deals with the possibility of GRANTING access to impostors who should be REJECTED?A .  Type I errorB .  Type II errorC .  Type III errorD .  Crossover errorView AnswerAnswer: B Explanation: When the biometric system accepts impostors who should have been...

November 10, 2018 No Comments READ MORE +