Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the HIGHEST priority in agile development?

A.

Selecting appropriate coding language

B.

Managing costs of product delivery

C.

Early and continuous delivery of software

D.

Maximizing the amount of code delivered

Which of the following is the key requirement for test results when implementing forensic procedures?

A.

The test results must be cost-effective.

B.

The test result must be authorized.

C.

The test results must be quantifiable.

D.

The test results must be reproducible.

Which of the following MUST the administrator of a security information and event management (SIEM) system ensure?

A.

All sources are reporting in the exact same Extensible Markup Language (XML) format.

B.

Data sources do not contain information infringing upon privacy regulations.

C.

All sources are synchronized with a common time reference.

D.

Each source uses the same Internet Protocol (IP) address for reporting.

Additional padding may be added to toe Encapsulating Security Protocol (ESP) b trailer to provide which of the following?

A.

Access control

B.

Partial traffic flow confidentiality

C.

Protection against replay attack

D.

Data origin authentication

Which of the following trust services principles refers to the accessibility of information used by the systems, products, or services offered to a third-party provider’s customers?

A.

Security

B.

Privacy

C.

Access

D.

Availability

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?

A.

Add a new rule to the application layer firewall

B.

Block access to the service

C.

Install an Intrusion Detection System (IDS)

D.

Patch the application source code

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

A.

Packet filtering

B.

Port services filtering

C.

Content filtering

D.

Application access control

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?

A.

Intrusion Prevention Systems (IPS)

B.

Intrusion Detection Systems (IDS)

C.

Stateful firewalls

D.

Network Behavior Analysis (NBA) tools

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

A.

Transport layer

B.

Application layer

C.

Network layer

D.

Session layer

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

A.

Link layer

B.

Physical layer

C.

Session layer

D.

Application layer

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

A.

Layer 2 Tunneling Protocol (L2TP)

B.

Link Control Protocol (LCP)

C.

Challenge Handshake Authentication Protocol (CHAP)

D.

Packet Transfer Protocol (PTP)

What is the purpose of an Internet Protocol (IP) spoofing attack?

A.

To send excessive amounts of data to a process, making it unpredictable

B.

To intercept network traffic without authorization

C.

To disguise the destination address from a target’s IP filtering devices

D.

To convince a system that it is communicating with a known entity

An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

A.

Implement packet filtering on the network firewalls

B.

Install Host Based Intrusion Detection Systems (HIDS)

C.

Require strong authentication for administrators

D.

Implement logical network segmentation at the switches

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

A.

WEP uses a small range Initialization Vector (IV)

B.

WEP uses Message Digest 5 (MD5)

C.

WEP uses Diffie-Hellman

D.

WEP does not use any Initialization Vector (IV)

Which of the following BEST describes the purpose of the security functional requirements of Common Criteria?

A.

Level of assurance of the Target of Evaluation (TOE) in intended operational environment

B.

Selection to meet the security objectives stated in test documents

C.

Security behavior expected of a TOE

D.

Definition of the roles and responsibilities