Controlling access to information systems and associated networks is necessary for the preservation of their:

Controlling access to information systems and associated networks is necessary for the preservation of their:A .  Authenticity, confidentiality and availabilityB .  Confidentiality, integrity, and availability.C .  integrity and availability.D .  authenticity,confidentiality, integrity and availability.View AnswerAnswer: B Explanation: Controlling access to information systems and associated networks is necessary for the preservation...

March 17, 2019 No Comments READ MORE +

A database view is the results of which of the following operations?

A database view is the results of which of the following operations?A .  Join and Select.B .  Join, Insert, and Project.C .  Join, Project, and Create.D .  Join, Project, and Select.View AnswerAnswer: D Explanation: 1 The formal description of how a relational database operates. 2 The mathematics which underpin SQL operations....

March 17, 2019 No Comments READ MORE +

Which one of the following can be identified when exceptions occur using operations security detective controls?

Which one of the following can be identified when exceptions occur using operations security detective controls?A . Unauthorized people seeing confidential reports.B . Unauthorized people destroying confidential reports.C . Authorized operations people performing unauthorized functions.D . Authorized operations people not responding to important console messages.View AnswerAnswer: C

March 17, 2019 No Comments READ MORE +

In Mandatory Access Control, sensitivity labels attached to object contain what information?

In Mandatory Access Control, sensitivity labels attached to object contain what information?A .  The item's classificationB .  The item's classification and category setC .  The item's categoryD .  The items's need to knowView AnswerAnswer: B Explanation: The following is the correct answer the item's classification and category set. A Sensitivity label...

March 17, 2019 No Comments READ MORE +

What kind of certificate is used to validate a user identity?

What kind of certificate is used to validate a user identity?A .  Public key certificateB .  Attribute certificateC .  Root certificateD .  Code signing certificateView AnswerAnswer: A Explanation: In cryptography, a public key certificate (or identity certificate) is an electronic document which incorporates a digital signature to bind together a...

March 16, 2019 No Comments READ MORE +

Which of the following is the MOST secure password technique?

Which of the following is the MOST secure password technique?A . PassphraseB . One-time passwordC . Cognitive passwordD . CiphertextView AnswerAnswer: B

March 16, 2019 No Comments READ MORE +

Which of the following is a potential drawback of using the defense-in-depth principle?

Which of the following is a potential drawback of using the defense-in-depth principle?A . Increased system complexityB . Increased component failure ratesC . Redundant components are requiredD . Lower intrusion detection performanceView AnswerAnswer: A

March 16, 2019 No Comments READ MORE +

In Synchronous dynamic password tokens: 

In Synchronous dynamic password tokens: A . The token generates a new password value at fixed time intervals (this password could be based on the time of day encrypted with a secret key).B .  The token generates a new non-unique password value at fixed time intervals (this password could be based...

March 16, 2019 No Comments READ MORE +

In configuration management, what baseline configuration information MUST be maintained for each computer system?

In configuration management, what baseline configuration information MUST be maintained for each computer system?A . Operating system and version, patch level, applications running, and versions.B . List of system changes, test reports, and change approvalsC . Last vulnerability assessment report and initial risk assessment reportD . Date of last update,...

March 15, 2019 No Comments READ MORE +

A central authority determines what subjects can have access to certain objects based on the organizational security policy is called:

A central authority determines what subjects can have access to certain objects based on the organizational security policy is called:A .  Mandatory Access ControlB .  Discretionary Access ControlC .  Non-Discretionary Access ControlD .  Rule-based Access controlView AnswerAnswer: C Explanation: A central authority determines what subjects can have access to certain...

March 15, 2019 No Comments READ MORE +