New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts. There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?

A.

Create a policy that forces users to create a password combined with special characters.

B.

Create a policy to enter their personal email id while logged in to the system.

C.

Create a policy to enter their employee code while logged in to the system.

D.

Create a new policy that forces users to change their passwords once every 15 days.

You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?

A.

System state data

B.

Users manual

C.

DNS record

D.

Cache memory

Which of the following policies is a set of rules applied by the owner/manager of a network, Website or large computer system that restrict the ways in which the network site or system may be used?

A.

Default policy

B.

Certificate policy

C.

Informative policy

D.

Acceptable use policy

Mark is the project manager of the NHQ project in StarTech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

A.

$67,250

B.

$92,600

C.

$72,650

D.

$68,250

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

A.

Social engineering

B.

Smurf

C.

Denial-of-Service

D.

Man-in-the-middle

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response?

A.

Risk owner

B.

Project sponsor

C.

Diane

D.

Subject matter expert

Which of the following standard file formats is used by Apple's iPod to store contact information?

A.

vCard

B.

hCard

C.

HFS+

D.

FAT32

Which of the following individuals calculates the recovery time and cost estimates while performing a business impact analysis (BIA)?

A.

Business process owner

B.

Business continuity coordinator

C.

Risk Executive

D.

Information security manager

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

A.

Steganography

B.

Email spoofing

C.

Web ripping

D.

Social engineering

You work as a Network Security Administrator for uCertify Inc. Your organization has set up a new Internet connection in place of the previous one. It is your responsibility to ensure that employees use the Internet only for official purposes. While reviewing Internet usages, you find that a few people have traversed and downloaded some inappropriate and illegal information. You want to make a policy to stop all these activities in the future. Which of the following policies will you implement to accomplish the task?

A.

Security policy

B.

Privacy policy

C.

Acceptable use policy

D.

Due care policy