Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following properties is not guaranteed by Digital signatures

A.

Authentication

B.

Confidentiality

C.

Non-Repudiation

D.

Integrity

When the ISC2 Mail server sends mail to other mail servers it becomes —?

A.

SMTP Server

B.

SMTP Peer

C.

SMTP Master

D.

SMTP Client

Why is an asset inventory much important?

A.

It tells you what to encrypt

B.

The law requires it

C.

It contains a price list

D.

You can't protect what you don't know you have

A collection of actions that must be followed in order to complete a task or process in accordance with a set of rules

A.

Policy

B.

Procedure

C.

Law

D.

Standard

Which of the following best describes the puposes of a business impact analysis?

A.

To document a predetermined set of instructions or procedures for restoring IT and communications services after a disruption

B.

To mitigate security violation and ensure that business operation can continue during a contigency

C.

To provide a high level overview of the disaster recovery plan

D.

To analyze an information systems requirements and functions in order to determine system contingency priorities

A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time.

A.

Spoofing

B.

Phishing

C.

DOS

D.

Advanced Persistent Threat

Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information

A.

Risk Management

B.

Risk Assessment

C.

Risk Mitigation

D.

Adequate Security

Which of the following is not a source of redundant power

A.

Generator

B.

Utility

C.

UPS

D.

HVAC

Why is security training important?

A.

Because it fulfills regulatory requirements.

B.

Because it helps people to perform their job duties more efficiently.

C.

Because it reduces the risk of certain types of attacks, like social engineering.

D.

AII

Exhibit.

How many keys would be required to support 50 users in an asymmetric cryptography system?

A.

100

B.

200

C.

50

D.

1225