New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the purpose of the CIA triad terms

A.

To make security more understable to management and users

B.

To describe security using relevant and meaningful words

C.

To define the purpose of security

D.

AII

EKristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs. The published user agreement states that the company will not share personal user data with any entities without the users' explicit permission. According to the ISC2 Code of Ethics, to whom does Kristal ultimately report in this situation?

A.

The company Kristal works for

B.

The governments of the countries where the company operates

C.

ISC2

D.

The users

What does Personally Identifiable Information (Pll) pertain to?

A.

Information about an individual's health status

B.

Data about an individual that could be used to identify them (Correct)

C.

Trade secrets, research, business plans and intellectual property

D.

The importance assigned to information by its owner

What type of attack does the attacker store and reuse login information. Select the BEST answer?

A.

Man-in-the-middle attack

B.

Smurf attack

C.

DDoS attack

D.

Replay attack

Who is responsible for publishing and signing the organization s policies?

A.

The security office

B.

Human resources

C.

Senior management

D.

The legal department

A_________is a distributed denial-of-service (DDoS) attack in which an attacker attempts to flood a targeted server with Internet Control Message Protocol (ICMP) packets.

A.

DOS

B.

Syn flood

C.

Smurf attack

D.

Phishing attack

Finance Server and Transactions Server has restored its original facility after a disaster, what should be moved in FIRST?

A.

Management

B.

Most critical systems

C.

Most critical functions

D.

Least critical functions

Which of the following is very likely to be used in a disaster recovery (DR) effort?

A.

Guard dogs

B.

Contract personnel

C.

Data backups

D.

Anti-malware solutions

Which protocol is used for secure email

A.

POP3S

B.

IMAPS

C.

SMTPS

D.

AII

organization experiences a security event that potentially jeopardizes the confidentiality, integrity or availability of its information system. What term best describes this situation?

A.

Breach

B.

Event

C.

Incident

D.

Exploit