What should be the INITIAL response to Intrusion Detection System/Intrusion Prevention System (IDS/IPS) alerts?

What should be the INITIAL response to Intrusion Detection System/Intrusion Prevention System (IDS/IPS) alerts?A . Ensure that the Incident Response Plan is available and current.B . Determine the traffic's initial source and block the appropriate port.C . Disable or disconnect suspected target and source systems.D . Verify the threat and...

April 4, 2019 No Comments READ MORE +

Which Radio Frequency Interference (RFI) phenomenon associated with bundled cable runs can create information leakage?

Which Radio Frequency Interference (RFI) phenomenon associated with bundled cable runs can create information leakage?A . TransferenceB . Covert channelC . BleedingD . Cross-talkView AnswerAnswer: D

April 4, 2019 No Comments READ MORE +

Open box testing, in the Flaw Hypothesis Methodology of Penetration Testing applies to the analysis of

Open box testing, in the Flaw Hypothesis Methodology of Penetration Testing applies to the analysis ofA . Routers and firewallsB . Host-based IDS systemsC . Network-based IDS systemsD . General purpose operating systemsView AnswerAnswer: D

April 3, 2019 No Comments READ MORE +

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?A . WalkthroughB . SimulationC . ParallelD . White boxView AnswerAnswer: B Explanation: Reference: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/ file/61029/Chapter-6-Business-Continuity-Management_amends_04042012.pdf

April 3, 2019 No Comments READ MORE +

Which of the following is the FIRST step in the incident response process?

Which of the following is the FIRST step in the incident response process?A . Determine the cause of the incidentB . Disconnect the system involved from the networkC . Isolate and contain the system involvedD . Investigate all symptoms to confirm the incidentView AnswerAnswer: D

April 2, 2019 No Comments READ MORE +

Which of the following could cause a Denial of Service (DoS) against an authentication system?

Which of the following could cause a Denial of Service (DoS) against an authentication system?A . Encryption of audit logsB . No archiving of audit logsC . Hashing of audit logsD . Remote access audit logsView AnswerAnswer: D

April 2, 2019 No Comments READ MORE +

Which of the following would be true about Static password tokens?

Which of the following would be true about Static password tokens?A .  The owner identity is authenticated by the tokenB .  The owner will never be authenticated by the token.C .  The owner will authenticate himself to the system.D .  The token does not authenticates the token owner but the...

April 2, 2019 No Comments READ MORE +

When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4), where is the GRE header inserted?

When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4), where is the GRE header inserted?A . Into the options fieldB . Between the delivery header and payloadC . Between the source and destination addressesD . Into the destination addressView AnswerAnswer: B

April 2, 2019 No Comments READ MORE +

What is called the percentage of invalid subjects that are falsely accepted by a Biometric authentication system?

What is called the percentage of invalid subjects that are falsely accepted by a Biometric authentication system?A .  False Rejection Rate (FRR) or Type I ErrorB .  False Acceptance Rate (FAR) or Type II ErrorC .  Crossover Error Rate (CER)D .  True Acceptance Rate (TAR) or Type III ErrorView AnswerAnswer:...

April 2, 2019 No Comments READ MORE +

What would be the MOST probable cause?

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?A . Absence of a Business Intelligence (BI) solutionB . Inadequate cost modelingC . Improper deployment of the Service-Oriented Architecture (SOA)D . Insufficient Service...

April 2, 2019 No Comments READ MORE +