Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following would provide the BEST stress testing environment taking under consideration and avoiding possible data exposure and leaks of sensitive data?

A.

Test environment using test data.

B.

Test environment using sanitized live workloads data.

C.

Production environment using test data.

D.

Production environment using sanitized live workloads data.

During which phase of an IT system life cycle are security requirements developed?

A.

Operation

B.

Initiation

C.

Functional design analysis and Planning

D.

Implementation

Which of the following security modes of operation involves the highest risk?

A.

Compartmented Security Mode

B.

Multilevel Security Mode

C.

System-High Security Mode

D.

Dedicated Security Mode

What are the three FUNDAMENTAL principles of security?

A.

Accountability, confidentiality and integrity

B.

Confidentiality, integrity and availability

C.

Integrity, availability and accountability

D.

Availability, accountability and confidentiality

The security of a computer application is most effective and economical in which of the following cases?

A.

The system is optimized prior to the addition of security.

B.

The system is procured off-the-shelf.

C.

The system is customized to meet the specific security threat.

D.

The system is originally designed to provide the necessary security.

An area of the Telecommunications and Network Security domain that directly affects the Information Systems Security tenet of Availability can be defined as:

A.

Netware availability

B.

Network availability

C.

Network acceptability

D.

Network accountability

Which of the following choice is NOT normally part of the questions that would be asked in regards to an organization's information security policy?

A.

Who is involved in establishing the security policy?

B.

Where is the organization's security policy defined?

C.

What are the actions that need to be performed in case of a disaster?

D.

Who is responsible for monitoring compliance to the organization's security policy?

One of the following assertions is NOT a characteristic of Internet Protocol Security (IPsec)

A.

Data cannot be read by unauthorized parties

B.

The identity of all IPsec endpoints are confirmed by other endpoints

C.

Data is delivered in the exact order in which it is sent

D.

The number of packets being exchanged can be counted.

Which of the following best corresponds to the type of memory addressing where the address location that is specified in the program instruction contains the address of the final desired location?

A.

Direct addressing

B.

Indirect addressing

C.

Indexed addressing

D.

Program addressing

Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?

A.

Estimating the cost of the changes requested

B.

Recreating and analyzing the problem

C.

Determining the interface that is presented to the user

D.

Establishing the priorities of requests

Ensuring least privilege does not require:

A.

Identifying what the user's job is.

B.

Ensuring that the user alone does not have sufficient rights to subvert an important process.

C.

Determining the minimum set of privileges required for a user to perform their duties.

D.

Restricting the user to required privileges and nothing more.

As per the Orange Book, what are two types of system assurance?

A.

Operational Assurance and Architectural Assurance.

B.

Design Assurance and Implementation Assurance.

C.

Architectural Assurance and Implementation Assurance.

D.

Operational Assurance and Life-Cycle Assurance.

Virus scanning and content inspection of SMIME encrypted e-mail without doing any further processing is:

A.

Not possible

B.

Only possible with key recovery scheme of all user keys

C.

It is possible only if X509 Version 3 certificates are used

D.

It is possible only by "brute force" decryption

In computing what is the name of a non-self-replicating type of malware program containing malicious code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically causing loss or theft of data, and possible system harm.

A.

virus

B.

worm

C.

Trojan horse.

D.

trapdoor

The high availability of multiple all-inclusive, easy-to-use hacking tools that do NOT require much technical knowledge has brought a growth in the number of which type of attackers?

A.

Black hats

B.

White hats

C.

Script kiddies

D.

Phreakers

Which of the following technologies is a target of XSS or CSS (Cross-Site Scripting) attacks?

A.

Web Applications

B.

Intrusion Detection Systems

C.

Firewalls

D.

DNS Servers

What do the ILOVEYOU and Melissa virus attacks have in common?

A.

They are both denial-of-service (DOS) attacks.

B.

They have nothing in common.

C.

They are both masquerading attacks.

D.

They are both social engineering attacks.

What is malware that can spread itself over open network connections?

A.

Worm

B.

Rootkit

C.

Adware

D.

Logic Bomb

Which of the following virus types changes some of its characteristics as it spreads?

A.

Boot Sector

B.

Parasitic

C.

Stealth

D.

Polymorphic

What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?

A.

Data fiddling

B.

Data diddling

C.

Salami techniques

D.

Trojan horses