Which of the following best explains why computerized information systems frequently fail to meet the needs of users?

Which of the following best explains why computerized information systems frequently fail to meet the needs of users?A . Inadequate quality assurance (QA) toolsB . Constantly changing user needsC . Inadequate user participation in defining the system's requirementsD . Inadequate project management.View AnswerAnswer: C

March 20, 2019 No Comments READ MORE +

When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?

When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?A . After the system preliminary design has been developed and the data security categorization has been performedB . After the vulnerability analysis has been performed and before the system detailed design beginsC . After the...

March 20, 2019 No Comments READ MORE +

Which set of principal tasks constitutes configuration management?

Which set of principal tasks constitutes configuration management?A . Program management, system engineering, and quality assurance.B . Requirements verification, design, and system integration and testing.C . Independent validation and verification of the initial and subsequent baseline.D . Identification, control, status accounting, and auditing of changes.View AnswerAnswer: D

March 20, 2019 No Comments READ MORE +

Which of the following tools can you use to assess your networks vulnerability?

Which of the following tools can you use to assess your networks vulnerability?A . ISSB . All of the choices.C . SATAND . BallistaView AnswerAnswer: B

March 20, 2019 No Comments READ MORE +

Separation of duties is valuable in deterring:

Separation of duties is valuable in deterring:A . DoSB . external intruderC . fraudD . trojan houseView AnswerAnswer: C

March 20, 2019 No Comments READ MORE +

The following is NOT a security characteristic we need to consider while choosing a biometric identification systems:

The following is NOT a security characteristic we need to consider while choosing a biometric identification systems:A .  data acquisition processB .  costC .  enrollment processD .  speed and user interfaceView AnswerAnswer: B Explanation: Cost is a factor when considering Biometrics but it is not a security characteristic. All the other...

March 20, 2019 No Comments READ MORE +

What is the primary role of smartcards in a PKI?

What is the primary role of smartcards in a PKI?A .  Transparent renewal of user keysB .  Easy distribution of the certificates between the usersC .  Fast hardware encryption of the raw dataD .  Tamper resistant, mobile storage and application of private keys of the usersView AnswerAnswer: D Explanation: HARRIS,...

March 20, 2019 No Comments READ MORE +

Organizations should consider which of the following first before allowing external access to their LANs via the Internet?

Organizations should consider which of the following first before allowing external access to their LANs via the Internet?A .  Plan for implementing workstation locking mechanisms.B .  Plan for protecting the modem pool.C .  Plan for providing the user with his account usage information.D .  Plan for considering proper authentication options.View...

March 20, 2019 No Comments READ MORE +

What needs to be done in order to return the server to normal operations?

FOR THIS QUESTION, REFER TO THE FOLLOWING INFORMATION An administrator is responsible for a data operations center that consists of a switched network with 500 desktops, a web server, an e-mail server, and several large application servers. The backup strategy utilizes one full backup performed each Sunday morning and daily...

March 20, 2019 No Comments READ MORE +

Which of the following offers advantages such as the ability to use stronger passwords, easier password administration, one set of credential, and faster resource access?

Which of the following offers advantages such as the ability to use stronger passwords, easier password administration, one set of credential, and faster resource access?A .  Smart cardsB .  Single Sign-On (SSO)C .  Symmetric CiphersD .  Public Key Infrastructure (PKI)View AnswerAnswer: B Explanation: The advantages of SSO include having the...

March 19, 2019 No Comments READ MORE +