Which of the following is an initial consideration when developing an information security management system?

Which of the following is an initial consideration when developing an information security management system?A . Identify the contractual security obligations that apply to the organizationsB . Understand the value of the information assetsC . Identify the level of residual risk that is tolerable to managementD . Identify relevant legislative...

May 27, 2022 No Comments READ MORE +

Which one of the following affects the classification of data?

Which one of the following affects the classification of data?A . Assigned security labelB . Multilevel Security (MLS) architectureC . Minimum query sizeD . Passage of timeView AnswerAnswer: D

May 27, 2022 No Comments READ MORE +

Which of the following is MOST important when assigning ownership of an asset to a department?

Which of the following is MOST important when assigning ownership of an asset to a department?A . The department should report to the business ownerB . Ownership of the asset should be periodically reviewedC . Individual accountability should be ensuredD . All members should be trained on their responsibilitiesView AnswerAnswer:...

May 27, 2022 No Comments READ MORE +

Which of the following wraps the decryption key of a full disk encryption implementation and ties the hard disk drive to a particular device?

Which of the following wraps the decryption key of a full disk encryption implementation and ties the hard disk drive to a particular device?A . Trusted Platform Module (TPM)B . Preboot eXecution Environment (PXE)C . Key Distribution Center (KDC)D . Simple Key-Management for Internet Protocol (SKIP)View AnswerAnswer: A

May 27, 2022 No Comments READ MORE +

Which of the following is the PRIMARY risk with using open source software in a commercial software construction?

Which of the following is the PRIMARY risk with using open source software in a commercial software construction?A . Lack of software documentationB . License agreements requiring release of modified codeC . Expiration of the license agreementD . Costs associated with support of the softwareView AnswerAnswer: D

May 27, 2022 No Comments READ MORE +

A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?

A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?A . Trojan horseB . Denial of Service (DoS)C . SpoofingD . Man-in-the-Middle (MITM)View AnswerAnswer: A

May 26, 2022 No Comments READ MORE +

The Structured Query Language (SQL) implements Discretionary Access Controls (DAC) using

The Structured Query Language (SQL) implements Discretionary Access Controls (DAC) usingA . INSERT and DELETC . GRANT and REVOKE . PUBLIC and PRIVATG . ROLLBACK and TERMINATView AnswerAnswer: B

May 26, 2022 No Comments READ MORE +

What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?

What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?A . Warm siteB . Hot siteC . Mirror siteD . Cold siteView AnswerAnswer: A

May 26, 2022 No Comments READ MORE +

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?A . Transport layerB . Application layerC . Network layerD . Session layerView AnswerAnswer: A

May 26, 2022 No Comments READ MORE +

Which of the following is the BEST method to prevent malware from being introduced into a production environment?

Which of the following is the BEST method to prevent malware from being introduced into a production environment?A . Purchase software from a limited list of retailersB . Verify the hash key or certificate key of all updatesC . Do not permit programs, patches, or updates from the InternetD ....

May 26, 2022 No Comments READ MORE +