Answered You can hire a professional tutor to get the answer.

QUESTION

DUE IN 4 HOURs In which testing is performed after a change to a system takes place, retesting to ensure functionality performance, and protection....

DUE IN 4 HOURs

In which testing is performed after a change to a system takes place, retesting to ensure functionality performance, and protection.

Question 128 options:

Integration testing

Unit testing

Acceptance testing

Regression testing

Question 129 (1 point)

Intrusion Detection Systems (IDS) can be used to detect changes in the following sensors, except:

Question 129 options:

Motion

Sounds and vibrations

Beams of light

Temperature

Question 130 (1 point)

Which of the following fire suppression methods was widely used but is no longer available due to the environmental issues it causes to the ozone.

Question 130 options:

FM-200

NAF-S-III

Halon

Argon

Question 131 (1 point)

Which access control is based on each subject's role and/or functional position?

Question 131 options:

DAC

MAC

RBAC

Non-RBAC

Question 132 (1 point)

Which of the following is not part of Risk management processes?

Question 132 options:

Risk assessment

Risk mitigation

Risk monitoring

Risk ignorance

Question 133 (1 point)

Specific state changes take place with specific types of attacks. If an attacker will carry out a remote buffer overflow, the following state will change. Which one of the state is incorrect?

Question 133 options:

The remote user connects to the system

The remote user sends data to an application

The data are executed and overwrite the buffer and possibly other memory segments.

The network is slow due to congested bandwidth.

Question 134 (1 point)

Another name for cryptography strength is ____________, which is an estimate of the effort and resources it would take an attacker to penetrate a cryptosystem. Fill in the blank.

Question 134 options:

Secrecy

Work factor

Cryptanalysis

Decryption

Question 135 (1 point)

The objective of ___________________ is to ensure that one person acting alone cannot compromise the company's security in any way.

Question 135 options:

Due care

Due diligence

Separation of duties

Trusted recovery states

Question 136 (1 point)

The BCP committee should include the following stakeholders except one:

Question 136 options:

Senior management

IT department

Security department

Independent auditor

Question 137 (1 point)

During

a Business Impact Analysis effort, what characteristics should threats

be mapped to in order to assess the impacts on our assets?

Question 137 options:

Maximum tolerable downtime

Objective-to-task

Deadlines

Security Plan

Question 138 (1 point)

TCSEC

provides a classification system that is divided into a hierarchical

division of assurance levels of the following. Select one that is not

part of these assurance levels.

Question 138 options:

Verified protection

Mandatory protection

Discretionary protection

Non-discretionary protection.

Question 139 (1 point)

Which type of risk analysis weighs potential threats based on dollar figures?

Question 139 options:

Assumptive

Correlative

Qualitative

Quantitative

Recursive

Question 140 (1 point)

________________

is all about ensuring that people, applications, equipment, and the

overall environment are properly and adequately secured. Fill in the

blank.

Question 140 options:

Cyber security

Operations security

Personal security

Environment security

Question 141 (1 point)

In what testing phase verifies that components work together as outlined in design specifications.

Question 141 options:

Integration testing

Unit testing

Acceptance testing

Regression testing

Question 142 (1 point)

_______________

is a systematic approach used to understand how different threats could

be realized and how a successful compromise could take place.

Question 142 options:

Privacy impact rating

Attack surface

Attack surface analysis

Threat modeling

Question 143 (1 point)

What is the advantage of having striping?

Question 143 options:

Redundancy

Speed

Large size

Failover

Question 144 (1 point)

Which

software development model emphasizes risk analysis per iteration and

is iterative in approach? This approach integrates customer feedback in

the development process.

Question 144 options:

Agile

Rapid application

Spiral

V-model

Question 145 (1 point)

Which

one of the following is the assurance evaluation that assigns an

evaluation assurance level that provides a thorough and stringent

testing.

Question 145 options:

Information Technology Security Evaluation Criteria

Common Criteria

Accreditation

Trusted Platform Evaluation

Question 146 (1 point)

To

protect personal information, vendors must adhere by the laws

established in each industry sector. Which one of the following personal

security protection activities the laws do not require organizations to

protect personal data?

Question 146 options:

Obtain consent when they collect, use, or disclose their personal information

Collect information by fair and lawful means

Store, transmit, and change the data as necessary.

Have personal information policies that are clear, understandable, and readily available.

Question 147 (1 point)

________

is a methodical approach to standardize requirements discovery, design,

development, testing, and implementation in every phase of a system.

Question 147 options:

Certification

System development life cycle

Accreditation

Project management

Question 148 (1 point)

Which calculation uses the formula AV × EF?

Question 148 options:

SLE

ARO

ALE

Cost-Benefit Analysis

Question 149 (1 point)

Which

of the following security testings involves performing attacks on a

network and its systems with permission, in order to determine the

effectiveness of their security controls and processes.

Question 149 options:

Vulnerability testing

Disaster recovery testing

Penetration testing

Malware sandbox testing

Question 150 (1 point)

Of the 3 types of offsite facilities a company can choose from for business continuity do not include which of the following:

Question 150 options:

Hot site

Cold site

Warm site

Alternate site

Question 151 (1 point)

________ control is based on a user's role and responsibilities within the organization.

Question 151 options:

Discretionary access

Mandatory access

Administrative access

Role-based access

Question 152 (1 point)

The

____________ is the earliest time period and a service level within

which a business process must be restored after a disaster to avoid

unacceptable consequences associated with a break in business

continuity. The ____________ is the acceptable amount of data loss

measured in time. This value represents the earliest point in time at

which data must be recovered.

Question 152 options:

RTO, RPO

RPO, RTO

MTD, Recovery

RPO, MTD

Question 153 (1 point)

Companies can choose from the following outsourced DR site. Which site is considered most expensive?

Question 153 options:

Hot site

Mirror site

Warm site

Cold site

Question 154 (1 point)

____________

means that an individual should have just enough permission and rights

to fulfill his roles and responsibilities in the company and no more.

Question 154 options:

Least privilege

Job rotation

Mandatory vacations

Collusion

Question 155 (1 point)

What type of malware is self-replicating?

Question 155 options:

Trojan

Worm

Clone

Spam

Virus

Question 156 (1 point)

Which access control model is based on an operating system enforcing the system's policy through the use of security labels?

Question 156 options:

DAC

MAC

RBAC

Non-RBAC

Question 157 (1 point)

As

part of disk configuration, we can configure data stripped over several

disk drives without any redundancy or parity bits involved. What is

this technique?

Question 157 options:

Mirroring

Stripping

Hamming

Stripping with parity.

Question 158 (1 point)

A multi-factor authentication includes the following. Select all correct answers.

Question 158 options:

What you know

What you have

What you are

What you used to do (behavioral).

Question 159 (1 point)

Which of the following is the most commonly used physical security control?

Question 159 options:

Fences

Door Locks

CCTV

Security guards

Question 160 (1 point)

What e-mail protocol is commonly used for the sending of Internet e-mail.

Question 160 options:

POP

FTP

SMTP

HTTP

Question 161 (1 point)

The

total combination of protection mechanisms in a computer system to

include hardware software, firmware, and procedures is a(n):

Question 161 options:

Trusted computing base

Security baseline

Security template

Evaluation standard

None of the above

Question 162 (1 point)

Which law governs disclosure of financial data for proper financial reporting?

Question 162 options:

Computer Fraud and Abuse Act of 1986

Graham-Leach Bliley Act of 1999

Health Insurance Portability and Accountability of 1996

Sarbanes-Oxley Act of 2002

None of the above

Question 163 (1 point)

A PKI can be made up of any of the following entities and functions except

Question 163 options:

Certification authority

Timestamping

Certificate revocation system

X.500 Directory

Question 164 (1 point)

Which access control method is based on the jobs a user is allowed to perform within an organization?

Question 164 options:

Discretionary Access Control (DAC)

Lattice Model

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

All of the above

Question 165 (1 point)

________________

ensures that the necessary level of secrecy is enforced at each

junction of data processing and prevents any unauthorized disclosure.

Fill in the blank.

Question 165 options:

Availability

Integrity

Confidentiality

Authentication

Question 166 (1 point)

Auditing

can collect logs from various levels. Which one of the following is not

commonly collected events unless assigned to a specific device?

Question 166 options:

System level events

Application level events

User level events

Network level events

Question 167 (1 point)

An

attacker sends multiple service requests to the victim's computer until

these service requests eventually overwhelm the target system, causing

it to freeze, reboot, and ultimately unable to perform regular tasks.

What is this called?

Question 167 options:

Mail bombing

Ping of death

DOS attack

Man in the middle attack

Question 168 (1 point)

Which one of the attacks is a common covert channel attack using the ICMP protocol?

Question 168 options:

JohntheRipper

Pass the Hash

Loki

DoS

Question 169 (1 point)

Which threat agent group includes malicious users?

Question 169 options:

Natural

Human

Technical

Operational

Question 170 (1 point)

Simultaneous execution of more than one program by a single OS is called _____________. Fill in the blank.

Question 170 options:

interrupt

Multitasking

Multiprocessing

Preemptive multitasking

Question 171 (1 point)

An

______________ is a methodical approach to standardize requirement

discovery, design, development, testing, and implementation in every

phase of a system. ___________ is the technical testing of a system.

 _________________ is the formal authorization given by management to

allow a system to operate in a specific environment. Fill in the blanks.

Question 171 options:

Accreditation, Certification, SDLC

Certification, SDLC, Accreditation

SDLC, Accreditation, Certification

SDLC, Certification, Accreditation

Question 172 (1 point)

During emergency if one can't get to the organization's data, which security objectives has been compromised?

Question 172 options:

Availability

Integrity

Confidentiality

Authentication

Question 173 (1 point)

Discretionary access control is determined by _____________. Fill in the blank.

Question 173 options:

Administrator

Object owner

Users

Custodian

Question 174 (1 point)

Symmetric key algorithm requires the following number of keys.

Question 174 options:

N(N-1)/2

N(N*2)/3

N/2

N*2/3

Question 175 (1 point)

What type of network device is responsible for determining the best route from the source to the destination?

Question 175 options:

Switch

Repeater

Bridge

Router

Question 176 (1 point)

In

SDLC model, _________________ determines "the why" create this

software, the "what" the software will do, and the "for whom" the

software will be created.

Question 176 options:

Requirement gathering

Design

Testing

Maintenance

Question 177 (1 point)

Which one of the security objectives is not part of the fundamental principles of security?

Question 177 options:

Availability

Integrity

Confidentiality

Authentication

Question 178 (1 point)

What type of control reacts to changes in an environment or process that deviates from a normal or accepted pattern?

Question 178 options:

Preventative Control

Corrective Control

Detective Control

Observant Control

Question 179 (1 point)

____________

is the readable version of a message. After an encryption process, the

resulting text is referred to as _______________. Fill in the blanks.

Question 179 options:

Plaintext, key

Plaintext, ciphertext

Ciphertext, key

Ciphertext, plaintext

Question 180 (1 point)

What is the level of risk an organization is willing to accept?

Question 180 options:

Baseline

Minimum configuration

Acceptable risk

Risk appetite

Question 181 (1 point)

The

Business continuity plan should include a team to assess the damage

once a disaster has taken place. The assessment include the following

action but one.

Question 181 options:

Determine the cause of the disaster

Contact the outsourced DR vendor

Determine the potential for further damage

Identify the level of functionality for the critical resources.

Question 182 (1 point)

What would a high level software program language be defined as?

Question 182 options:

Generation two

Generation three

Generation four

High Generation

Question 183 (1 point)

______________ means that over time, more than one person fulfills the tasks of one position within the company.

Question 183 options:

Least privilege

Job rotation

Mandatory vacation

Collusion

Question 184 (1 point)

Which of the following is not an application protocol?

Question 184 options:

SMTP

HTTP

SNMP

ICMP

Question 185 (1 point)

Doors that are designed to stay locked during power outages are described as:

Question 185 options:

Fail safe

Fail Secure

Fault Tolerant

UPS

Fail Closed

Question 186 (1 point)

In

_______________ cryptography, a single secret key is used between

entities, whereas in public key systems, each entity has different keys,

or _____________. The two different keys are mathematically related. If

a message is encrypted by one key, the other key is required in order

to decrypt the message.

Question 186 options:

Asymmetric key, symmetric key

Symmetric key, Asymmetric key

Cipher Algorithm, Cryptanalysis

Steganography, Symmetric key

Question 187 (1 point)

Which of the following services does cryptosystems not provide?

Question 187 options:

Confidentiality

Integrity

Authentication

Identification

Question 188 (1 point)

The one-time pad encryption is deemed unbreakable only if the following are true about the implementation process except one:

Question 188 options:

The pad must be used only one time

The pad must be as long as the message

The pad must be securely distributed and protected at its destination

The pad must be made up of truly non-random values

Question 189 (1 point)

Mandatory access control requires which of the following?

Question 189 options:

User and application

Data classification and encryption

Data classification and security clearance

Data classification and storage

Question 190 (1 point)

________________ determines if the product accurately represents and meets the specifications.

Question 190 options:

Privacy impact rating

Attack surface

Attack surface analysis

Verification

Question 191 (1 point)

Which type of proxy can distinguish between an FTP GET and a FTP PUT command?

Question 191 options:

Circuit-level proxy

Kernal proxy

Application-level

Multihomed

Question 192 (1 point)

This is a form of hiding data within another medium in order to elude detection of its existence.

Question 192 options:

Steganography

Cryptography

Encryption

Hashing

Question 193 (1 point)

Determining

the value of assets is useful to an organization's security risk

assessment. However, which one of the following is not the primary

reasons?

Question 193 options:

To perform an effective cost/benefit analysis

To select specific countermeasures and safeguards

To understand what exactly is at risk

To accurately appropriate the insurance premium

Question 194 (1 point)

Which of the following is not non-volatile?

Question 194 options:

ROM

PROM

EPROM

RAM

Question 195 (1 point)

Which of the following is an enterprise security architecture framework?

Question 195 options:

MODAF

TOGAF

ITIL

SABSA

Question 196 (1 point)

A fixed-length value used as a message fingerprint is called a __________?

Question 196 options:

Message Authentication Code (MAC)

Hash Value

Message Number

Digital Signature

Question 197 (1 point)

Protection

rings in an Operating System provide support for availability,

integrity and confidentiality. Which protection ring does the Operating

System operates in?

Question 197 options:

Ring 0

Ring 1

Ring 2

Ring 3

Question 198 (1 point)

The cryptography mechanism which hides information within images is known as?

Question 198 options:

Cryptography

Cryptanalysis

Steganography

Encryption

Transposition

Question 199 (1 point)

A secret key that is used for data encryption only one time is called a _______?

Question 199 options:

Public Key

Asymmetric Key

Private Key

Session Key

Question 200 (1 point)

When

comparing different biometric systems, one of the most important

metrics used is called the _________, which represents the point at

which the false rejection rate equals the false acceptance rate.

Question 200 options:

Biometric analytical equation

Crossover error rate

Type I error

Type II error

Due in 4 hours

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question