A network-based vulnerability assessment is a type of test also referred to as:
A network-based vulnerability assessment is a type of test also referred to as:A . An active vulnerability assessment.B . A routing vulnerability assessment.C . A host-based vulnerability assessment.D . A passive vulnerability assessment.View AnswerAnswer: A Explanation: A network-based vulnerability assessment tool/system either re-enacts system attacks, noting and recording responses to the...
Which of the following describes a computer processing architecture in which a language compiler or pre-processor breaks program instructions down into basic operations that can be performed by the processor at the same time?
Which of the following describes a computer processing architecture in which a language compiler or pre-processor breaks program instructions down into basic operations that can be performed by the processor at the same time?A . Very-Long Instruction-Word Processor (VLIW)B . Complex-Instruction-Set-Computer (CISC)C . Reduced-Instruction-Set-Computer (RISC)D . Super Scalar Processor Architecture...
Which of the following is the MOST important aspect relating to employee termination?
Which of the following is the MOST important aspect relating to employee termination?A . The details of employee have been removed from active payroll files.B . Company property provided to the employee has been returned.C . User ID and passwords of the employee have been deleted.D . The appropriate company...
Which of the following security models does NOT concern itself with the flow of data?
Which of the following security models does NOT concern itself with the flow of data?A . The information flow modelB . The Biba modelC . The Bell-LaPadula modelD . The noninterference modelView AnswerAnswer: D Explanation: The goal of a noninterference model is to strictly separate differing security levels to assure...
A trusted system does NOT involve which of the following?
A trusted system does NOT involve which of the following?A . Enforcement of a security policy.B . Sufficiency and effectiveness of mechanisms to be able to enforce a security policy.C . Assurance that the security policy can be enforced in an efficient and reliable manner.D . Independently-verifiable evidence that the...
What is the primary role of smartcards in a PKI?
What is the primary role of smartcards in a PKI?A . Transparent renewal of user keysB . Easy distribution of the certificates between the usersC . Fast hardware encryption of the raw dataD . Tamper resistant, mobile storage and application of private keys of the usersView AnswerAnswer: D Explanation: HARRIS,...
Which of the following floors would be most appropriate to locate information processing facilities in a 6-stories building?
Which of the following floors would be most appropriate to locate information processing facilities in a 6-stories building?A . BasementB . Ground floorC . Third floorD . Sixth floorView AnswerAnswer: C Explanation: You data center should be located in the middle of the facility or the core of a building to provide...
The Orange Book is founded upon which security policy model?
The Orange Book is founded upon which security policy model?A . The Biba ModelB . The Bell LaPadula ModelC . Clark-Wilson ModelD . TEMPESTView AnswerAnswer: B Explanation: From the glossary of Computer Security Basics: The Bell-LaPadula model is the security policy model on which the Orange Book requirements are based....
What is a common problem when using vibration detection devices for perimeter control?
What is a common problem when using vibration detection devices for perimeter control?A . They are vulnerable to non-adversarial disturbances.B . They can be defeated by electronic means.C . Signal amplitude is affected by weather conditions.D . They must be buried below the frost line.View AnswerAnswer: A Explanation: Vibration sensors are...
When a biometric system is used, which error type deals with the possibility of GRANTING access to impostors who should be REJECTED?
When a biometric system is used, which error type deals with the possibility of GRANTING access to impostors who should be REJECTED?A . Type I errorB . Type II errorC . Type III errorD . Crossover errorView AnswerAnswer: B Explanation: When the biometric system accepts impostors who should have been...