Which of the following is an initial consideration when developing an information security management system?
Which of the following is an initial consideration when developing an information security management system?A . Identify the contractual security obligations that apply to the organizationsB . Understand the value of the information assetsC . Identify the level of residual risk that is tolerable to managementD . Identify relevant legislative...
Which one of the following affects the classification of data?
Which one of the following affects the classification of data?A . Assigned security labelB . Multilevel Security (MLS) architectureC . Minimum query sizeD . Passage of timeView AnswerAnswer: D
Which of the following is MOST important when assigning ownership of an asset to a department?
Which of the following is MOST important when assigning ownership of an asset to a department?A . The department should report to the business ownerB . Ownership of the asset should be periodically reviewedC . Individual accountability should be ensuredD . All members should be trained on their responsibilitiesView AnswerAnswer:...
Which of the following wraps the decryption key of a full disk encryption implementation and ties the hard disk drive to a particular device?
Which of the following wraps the decryption key of a full disk encryption implementation and ties the hard disk drive to a particular device?A . Trusted Platform Module (TPM)B . Preboot eXecution Environment (PXE)C . Key Distribution Center (KDC)D . Simple Key-Management for Internet Protocol (SKIP)View AnswerAnswer: A
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?A . Lack of software documentationB . License agreements requiring release of modified codeC . Expiration of the license agreementD . Costs associated with support of the softwareView AnswerAnswer: D
A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?
A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?A . Trojan horseB . Denial of Service (DoS)C . SpoofingD . Man-in-the-Middle (MITM)View AnswerAnswer: A
The Structured Query Language (SQL) implements Discretionary Access Controls (DAC) using
The Structured Query Language (SQL) implements Discretionary Access Controls (DAC) usingA . INSERT and DELETC . GRANT and REVOKE . PUBLIC and PRIVATG . ROLLBACK and TERMINATView AnswerAnswer: B
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?A . Warm siteB . Hot siteC . Mirror siteD . Cold siteView AnswerAnswer: A
In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?
In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?A . Transport layerB . Application layerC . Network layerD . Session layerView AnswerAnswer: A
Which of the following is the BEST method to prevent malware from being introduced into a production environment?
Which of the following is the BEST method to prevent malware from being introduced into a production environment?A . Purchase software from a limited list of retailersB . Verify the hash key or certificate key of all updatesC . Do not permit programs, patches, or updates from the InternetD ....