Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A company seizes a mobile device suspected of being used in committing fraud. What would be the BEST method used by a forensic examiner to isolate the powered-on device from the network and preserve the evidence?

A.

Put the device in airplane mode

B.

Suspend the account with the telecommunication provider

C.

Remove the SIM card

D.

Turn the device off

Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center?

A.

Inert gas fire suppression system

B.

Halon gas fire suppression system

C.

Dry-pipe sprinklers

D.

Wet-pipe sprinklers

Which security access policy contains fixed security attributes that are used by the system to determine a

user’s access to a file or object?

A.

Mandatory Access Control (MAC)

B.

Access Control List (ACL)

C.

Discretionary Access Control (DAC)

D.

Authorized user control

What is the MAIN reason for testing a Disaster Recovery Plan (DRP)?

A.

To ensure Information Technology (IT) staff knows and performs roles assigned to each of them

B.

To validate backup sites’ effectiveness

C.

To find out what does not work and fix it

D.

To create a high level DRP awareness among Information Technology (IT) staff

A minimal implementation of endpoint security includes which of the following?

A.

Trusted platforms

B.

Host-based firewalls

C.

Token-based authentication

D.

Wireless Access Points (AP)

Mandatory Access Controls (MAC) are based on:

A.

security classification and security clearance

B.

data segmentation and data classification

C.

data labels and user access permissions

D.

user roles and data encryption

What protocol is often used between gateway hosts on the Internet?

A.

Exterior Gateway Protocol (EGP)

B.

Border Gateway Protocol (BGP)

C.

Open Shortest Path First (OSPF)

D.

Internet Control Message Protocol (ICMP)

Which of the following is a characteristic of an internal audit?

A.

An internal audit is typically shorter in duration than an external audit.

B.

The internal audit schedule is published to the organization well in advance.

C.

The internal auditor reports to the Information Technology (IT) department

D.

Management is responsible for reading and acting upon the internal audit results

Which of the following alarm systems is recommended to detect intrusions through windows in a high-noise, occupied environment?

A.

Acoustic sensor

B.

Motion sensor

C.

Shock sensor

D.

Photoelectric sensor

Who has the PRIMARY responsibility to ensure that security objectives are aligned with organization goals?

A.

Senior management

B.

Information security department

C.

Audit committee

D.

All users

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

A.

Truncating parts of the data

B.

Applying Access Control Lists (ACL) to the data

C.

Appending non-watermarked data to watermarked data

D.

Storing the data in a database

Which type of test would an organization perform in order to locate and target exploitable defects?

A.

Penetration

B.

System

C.

Performance

D.

Vulnerability

Which of the following combinations would MOST negatively affect availability?

A.

Denial of Service (DoS) attacks and outdated hardware

B.

Unauthorized transactions and outdated hardware

C.

Fire and accidental changes to data

D.

Unauthorized transactions and denial of service attacks

A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?

A.

25%

B.

50%

C.

75%

D.

100%

Which of the following MUST be scalable to address security concerns raised by the integration of third-party

identity services?

A.

Mandatory Access Controls (MAC)

B.

Enterprise security architecture

C.

Enterprise security procedures

D.

Role Based Access Controls (RBAC)