New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following Acts, enacted in the United States, amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

A.

The USA Patriot Act of 2001

B.

Civil Rights Act of 1991

C.

Sexual Predators Act

D.

PROTECT Act

You work as an Information Security Manager for uCertify Inc. You are working on the documentation of ISMS. Which of the following steps are concerned with ISMS?

Each correct answer represents a complete solution. Choose all that apply.

A.

Definition of the ISMS scope

B.

Disaster recovery planning

C.

Risk Management

D.

Definition of the security policy

Which of the following are the valid reasons for the occurrence of Drive-by download?

Each correct answer represents a complete solution. Choose all that apply.

A.

Viewing an e-mail message

B.

Updating windows files automatically

C.

Visiting a website

D.

Clicking on a deceptive pop-up window

You are setting up file permissions on a Windows server. Different users have different access needs. What should be your guiding principal in assigning file permissions?

A.

Make three groups (one with low access, 1 moderate, and 1 high) and fit everyone into one of these groups.

B.

Give users the minimal access required for their job, as this is more secure.

C.

Give everyone access, as this makes administration simpler.

D.

Block access to files until a user specifically requests any.

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to establish ISO standards for your organization. Which of the following standards provides guidelines on specifications and use of measurement techniques for the assessment of the effectiveness of an implemented information security management system and controls?

A.

BS7799

B.

ISO 27001

C.

ISO 9001

D.

ISO 27004

Which of the following are the negative points of CRAMM?

Each correct answer represents a complete solution. Choose all that apply.

A.

Full reviews, which usually last long, generate a lot of hard-copy output.

B.

It regularly updates extensive hierarchical countermeasure databases covering non-technical areas.

C.

After rapid changes to system or network reviewed, there is a possibility of insignificance of some results in a full review due to delay between analysis and implementation.

D.

It requires qualified and experienced practitioners to use it.

Mark works as a Network Security Administrator for uCertify Inc. He has installed IDS for matching incoming packets against known attacks. Which of the following types of intrusion detection techniques is being used?

A.

Host-based IDS

B.

Pattern Matching IDS

C.

Network-based IDS

D.

Signature-based IDS

Which of the following provides high availability of data?

A.

Anti-virus software

B.

RAID

C.

EFS

D.

Backup

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

A.

Snow

B.

Blindside

C.

ImageHide

D.

Stealth

Which of the following utilize information system in order to recognize, control, and protect information or any equipment used?

Each correct answer represents a complete solution. Choose all that apply.

A.

Storage

B.

Processing

C.

Development

D.

Transmission