The three PRIMARY requirements for a penetration test are

The three PRIMARY requirements for a penetration test areA . A defined goal, limited time period, and approval of managementB . A general objective, unlimited time, and approval of the network administratorC . An objective statement, disclosed methodology, and fixed costD . A stated objective, liability waiver, and disclosed methodologyView...

May 29, 2022 No Comments READ MORE +

A vulnerability test on an Information System (IS) is conducted to

A vulnerability test on an Information System (IS) is conducted toA . exploit security weaknesses in the IC . measure system performance on systems with weak security controls.D . evaluate the effectiveness of security controls.E . prepare for Disaster Recovery (DR) planning.View AnswerAnswer: C

May 29, 2022 No Comments READ MORE +

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?A . Transparent Database Encryption (TDE)B . Column level database encryptionC . Volume encryptionD . Data tokenizationView AnswerAnswer: D

May 29, 2022 No Comments READ MORE +

In a data classification scheme, the data is owned by the

In a data classification scheme, the data is owned by theA . system security managersB . business managersC . Information Technology (IT) managersD . end usersView AnswerAnswer: B

May 29, 2022 No Comments READ MORE +

An organization is designing a large enterprise-wide document repository system. They plan to have several different classification level areas with increasing levels of controls.

An organization is designing a large enterprise-wide document repository system. They plan to have several different classification level areas with increasing levels of controls. The BEST way to ensure document confidentiality in the repository is toA . encrypt the contents of the repository and document any exceptions to that requirement.B...

May 29, 2022 No Comments READ MORE +

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?A . Packet filteringB . Port services filteringC . Content filteringD . Application access controlView AnswerAnswer: A

May 29, 2022 No Comments READ MORE +

What is the ultimate objective of information classification?

What is the ultimate objective of information classification?A . To assign responsibility for mitigating the risk to vulnerable systemsB . To ensure that information assets receive an appropriate level of protectionC . To recognize that the value of any item of information may change over timeD . To recognize the...

May 29, 2022 No Comments READ MORE +

Which of the following is a PRIMARY advantage of using a third-party identity service?

Which of the following is a PRIMARY advantage of using a third-party identity service?A . Consolidation of multiple providersB . Directory synchronizationC . Web based logonD . Automated account managementView AnswerAnswer: D

May 28, 2022 No Comments READ MORE +

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?A . WEP uses a small range Initialization Vector (IV)B . WEP uses Message Digest 5 (MD5)C . WEP uses Diffie-HellmanD . WEP does not use any Initialization Vector (IV)View AnswerAnswer: A

May 28, 2022 No Comments READ MORE +

Checking routing information on e-mail to determine it is in a valid format and contains valid information is an example of which of the following anti-spam approaches?

Checking routing information on e-mail to determine it is in a valid format and contains valid information is an example of which of the following anti-spam approaches?A . Simple Mail Transfer Protocol (SMTP) blacklistB . Reverse Domain Name System (DNS) lookupC . Hashing algorithmD . Header analysisView AnswerAnswer: D

May 28, 2022 No Comments READ MORE +