Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Drag the following Security Engineering terms on the left to the BEST definition on the right.

Which of the following roles has the obligation to ensure that a third party provider is capable of processing and handling data in a secure manner and meeting the standards set by the organization?

A.

Data Custodian

B.

Data Owner

C.

Data Creator

D.

Data User

In which identity management process is the subject’s identity established?

A.

Trust

B.

Provisioning

C.

Authorization

D.

Enrollment

The BEST example of the concept of "something that a user has" when providing an authorized user access to a computing system is

A.

the user's hand geometry.

B.

a credential stored in a token.

C.

a passphrase.

D.

the user's face.

Which Web Services Security (WS-Security) specification handles the management of security tokens and the underlying policies for granting access? Click on the correct specification in the image below.

How does Encapsulating Security Payload (ESP) in transport mode affect the Internet Protocol (IP)?

A.

Encrypts and optionally authenticates the IP header, but not the IP payload

B.

Encrypts and optionally authenticates the IP payload, but not the IP header

C.

Authenticates the IP payload and selected portions of the IP header

D.

Encrypts and optionally authenticates the complete IP packet

Which of the following methods can be used to achieve confidentiality and integrity for data in transit?

A.

Multiprotocol Label Switching (MPLS)

B.

Internet Protocol Security (IPSec)

C.

Federated identity management

D.

Multi-factor authentication

By carefully aligning the pins in the lock, which of the following defines the opening of a mechanical lock without the proper key?

A.

Lock pinging

B.

Lock picking

C.

Lock bumping

D.

Lock bricking

Which of the following approaches is the MOST effective way to dispose of data on multiple hard drives?

A.

Delete every file on each drive.

B.

Destroy the partition table for each drive using the command line.

C.

Degauss each drive individually.

D.

Perform multiple passes on each drive using approved formatting methods.

What is the PRIMARY difference between security policies and security procedures?

A.

Policies are used to enforce violations, and procedures create penalties

B.

Policies point to guidelines, and procedures are more contractual in nature

C.

Policies are included in awareness training, and procedures give guidance

D.

Policies are generic in nature, and procedures contain operational details

The restoration priorities of a Disaster Recovery Plan (DRP) are based on which of the following documents?

A.

Service Level Agreement (SLA)

B.

Business Continuity Plan (BCP)

C.

Business Impact Analysis (BIA)

D.

Crisis management plan

Which of the following is the BIGGEST weakness when using native Lightweight Directory Access Protocol (LDAP) for authentication?

A.

Authorizations are not included in the server response

B.

Unsalted hashes are passed over the network

C.

The authentication session can be replayed

D.

Passwords are passed in clear text

Which of the following prevents improper aggregation of privileges in Role Based Access Control (RBAC)?

A.

Hierarchical inheritance

B.

Dynamic separation of duties

C.

The Clark-Wilson security model

D.

The Bell-LaPadula security model

In the Open System Interconnection (OSI) model, which layer is responsible for the transmission of binary data over a communications network?

A.

Application Layer

B.

Physical Layer

C.

Data-Link Layer

D.

Network Layer

During the Security Assessment and Authorization process, what is the PRIMARY purpose for conducting a hardware and software inventory?

A.

Calculate the value of assets being accredited.

B.

Create a list to include in the Security Assessment and Authorization package.

C.

Identify obsolete hardware and software.

D.

Define the boundaries of the information system.