1.
What type of federal government computing system requires that all individuals accessing the system have a need to know all of the information processed by that system?
A. 
B. 
C. 
D. 
2.
In which of the following security modes can you be assured that all users have access permissions for all information processed by the system but will not necessarily need to know of all that information?
A. 
B. 
C. 
D. 
3.
In what security mode must each user have the access approval and valid need to know for all information processed by a system?
A. 
B. 
C. 
D. 
4.
Which one of the following security modes does NOT require that all users have a security clearance for the highest level of information processed by the system?
A. 
B. 
C. 
D. 
5.
Which security mode provides the most granular control over resources and users?
A. 
B. 
C. 
D. 
6.
What security mode allows systems to process information at more than one level of security even when all users do not have appropriate clearances?
A. 
B. 
C. 
D. 
7.
On a much smaller scale, _____________ is deployed to repair or restore capability, functionality, or resources following a violation of security policy.
A. 
B. 
Corrective access control
C. 
D. 
Compensation access control
8.
Once a system is compromised, _____________ is deployed to restore it to its previous known good state.
A. 
Compensation access control
B. 
C. 
Restoration access control
D. 
Corrective access control
9.
What procedure returns business facilities and environments to a working state?
A. 
B. 
C. 
D. 
10.
What procedure returns business operations and processes to a working state?
A. 
B. 
C. 
D. 
11.
What is the practice of establishing emergency-response actions following a business related disaster?
A. 
Mutual assistance agreements
B. 
Business continuity planning
C. 
D. 
Disaster recovery planning
12.
What is the preventative practice of establishing and planning for business related threats and risks?
A. 
Disaster recovery planning
B. 
Business continuity planning
C. 
Mutual assistance agreements
D. 
13.
What action usually closes the identification phase of incident response?
A. 
Publishing an incident report
B. 
Gathering evidence of the incident
C. 
Notifying the incident response team
D. 
Isolating compromised systems
14.
What type of information is not normally included in the risk acceptance/mitigation portion of the BCP.
A. 
Reasons for accepting risks
B. 
Potential future events that might warrant reconsideration of the decision
C. 
Identification of insurance policies that apply to a given risks
15.
Which of the following elements is not necessary in the BCP documentation?
A. 
B. 
Emergency Response guidelines
C. 
D. 
16.
In what type of addressing scheme is the data actually supplied to the CPU as an argument?
A. 
B. 
C. 
D. 
17.
What type of addressing scheme supplies the CPU with a location that contains the memory address of the actual operand?
A. 
B. 
C. 
D. 
18.
In what type of addressing scheme is the actual address of the memory location provided to the CPU?
A. 
B. 
C. 
D. 
19.
In what type of addressing scheme uses a value stored in one of the CPU’s registers as the base location to start counting?
A. 
B. 
C. 
D. 
20.
Which one of the following is not a component of the DevOps model?
A. 
B. 
C. 
D. 
21.
Used to manipulate line voltages to steal long-distance services.
A. 
B. 
C. 
D. 
22.
Used to simulate tones of coins being deposited into a pay phone.
A. 
B. 
C. 
D. 
23.
Used to simulate 2600 Hz tones to interact directly with telephone networktrunk systems.
A. 
B. 
C. 
D. 
24.
Used to control the phone system. A dual-tone multifrequency (DTMF) generator (that is, a keypad)
A. 
B. 
C. 
D. 
25.
First generation languages.
A. 
B. 
C. 
All Complied Languages (C++, Java)
D. 
Attempt to approximate natural languages, including SQL, used by databases
E. 
Allows programmers to create code using visual interfaces