Which of the following refers to a location away from the computer...
Which layer is not part of the OSI model?
Defining technology security architecture in relationship with other...
Which of the following is NOT a natural environmental threat that an...
Remote Access does what of the following?
The doors of a data center spring open in the event of a fire....
When outsourcing IT systems
Encryption is converting a message from ciphertext to plaintext.
Define and detail the aspects of password selection that distinguish...
It can be said that IPSec
Test outputs should be compared against expected outputs.
A botnet can be characterized as
__________ requires that a user of process be granted access to only...
The major benefit of information classification is to
A disadvantage of single sign-on is
Effective security management:
The integrity of a forensic bit stream image is determined by:
When sensitive information is no longer critical but still within...
The monitoring of outbound network traffic for indicators of...
Modifying identifying information so as to make communication appear...
To maintain the security architecture, of the following, which is...
The best way to ensure that there is no data remanence of sensitive...
Which of the following terms refers to a mechanism which proves that...
What is not mentioned as a phase of an incident response?
Role-based access control
Polyalphabetic encryption techniques use multiple alphabets for each...
What type of risk remains after the implementation of new or enhanced...
Which of the following BEST describe three separate functions of CCTV?
Which of the following ensures constant redundancy and...
Which one is a benefit of a enterprise security architecture?
NIST identifies three service models that represent different types of...
Which of the following is the technology of indoor environmental...
A new installation requires a network in a heavy manufacturing area...
The strategy of forming layers of protection around an asset or...
Which of the following is most likely to detect DoS attacks?
Assuming a working IDS is in place, which of the following groups is...
An emerging concept of highly-interconnected physical devices with...
A guard dog patrolling the perimeter of a data center is what type of...
Which one of the following is a common system component in the system...
Before applying a software update to production systems, it is MOST...
A potential vulnerability of the Kerberos authentication server is
Which of the following methods is not acceptable for exercising the...
Which of the following is the technology of indoor environmental...
Within the realm of IT security, which of the following combinations...
The vast majority of Virtual Private Networks use
In which of the following alternative site configurations is the...
Which of the following terms BEST describes the effort to determine...
Which of the following is responsible for maintaining certificates in...
The best way to ensure that there is no data remanence of sensitive...
Attempting to crack a password by using common words from a text file...
Which of the following security standards is internationally...
Which of the following uses a Key Distribution Center (KDC) to...
What type of malware uses social engineering to trick a victim into...
Which regulatory guidance pertains to any company that is publicly...
A customer requests to connect their LAN to the internet. Which of the...
Which of the following describes the type of anti-virus software that...
Recently passed over for an executive promotion, Carol is anxious to...
What type of analysis emphasizes the formal study of what your...
Which of the following is not a characteristic of continuous...
Which of the following end-point devices would MOST likely be...
The only cipher system said to be unbreakable by brute force is
When malware infects a host and allows it to be used in a botnet for...
Data access decisions are best made by:
What are the three types of access control?
Since 9/11, airport parking garages now keep cars further away from...
When a certificate is revoked, what is the proper procedure?
Which of the following is part of the five rules of evidence?
Which one do you like?
Network information services (NIS) are used for what processes?
What is the best protection measure against unauthorized access to...
Asymmetric key cryptography is used for the following:
Authentication is
Security awareness training includes:
Wi-Fi Protected Access (WPA-2) uses Advanced Encryption Standard (AES)...
Many organizations purchase insurance policies to provide various...
What is the BEST means of protecting the physical devices associated...
Which of the following forms of attack can be used to disrupt even the...
Which is a fundamental disadvantage of biometrics?
When sensitive information is no longer critical but still within...
How are smart cards and memory cars functionally different?
Which of the following is NOT a consideration when choosing data...
Which of the following BEST determines the employment suitability of...
What protocol solicits MAC address from devices on the network without...
Which of the following supports asymmetric key cryptography?
Which of the following is correct about dynamic testing?
Which of the following is MOST important for successful business...
The main difference between a Security Event Information Management...
Management should decide when a system should be returned to...
Which of the following is true about maintaining the chain of custody...
Ann installs a new Wireless Access Point (WAP) and users are able to...
Which of the following categories of access control implementation...
Before applying a software update to production systems, it is MOST...
Administrative law is concerned with confining government power,...
Collusion is best mitigated by:
Sam is a software developer and has recently gone through secure...
Which of the following attacks allow bypassing access control lists on...
Which is the BEST choice for implementing encryption on a smart card?
To ensure proper forensics action when needed, an incident response...
A Security Event Management (SEM) service performs the following...
Which protocol offers native encryption capability, for both...
Which of the following is not one of the four typical elements of a...
Which cable has a relatively low-speed transmission medium consisting...
Managing the dialogue between two or more communicating devices is...
Which intrusion detection system's efficiency decreases with...
Protection practices that can be used to prevent man-in-the middle...
What is the output length of a RIPEMD-160 hash?
Single loss expectancy (SLE) is calculated by using:
What is the optimal placement for network-based intrusion detection...
A Service Organization Control (SOC) Report commonly covers a
Which of the following steps should be performed first in a business...
Which of the following is the primary desired result of any...
Sam is a software developer and has recently gone through secure...
Multi-layer protocols such as Modbus used in industrial control...
The key to a successful physical protection system is the integration...
Which of the following processes identifies the threats that can...
Well-written security program policies are BEST reviewed:
Formal acceptance of an evaluated system by management is known as:
Which type of law is derived from court decisions and codification of...
At a restricted facility, visitors are requested to provide...
A service's recovery point objective is zero. Which approach...
The (ISC)2 code of ethics resolves conflicts between canons by:
Good data management practices include:
Cross-functional teams formed to conceptualize, design, test, produce,...
What are the seven main categories of access control?
What would be the most appropriate interior sensor used for a building...
What are types of failures in biometric identification systems?
Users are reporting that some Internet websites are not accessible...
Your office is implementing an access control policy based on...
Of the following plans, which is designed to protect critical business...
Which one of the following describes the Information Technology...
Frame Relay and X.25 networks are part of which of the following?
A basic component of an industrial control system (ICS) that is most...
Substitution is mixing the location of plaintext throughout the...
Which of the following electronically stored information (ESI) are not...
What are the FOUR phases of the equipment lifecycle?
Which of the following can BEST be used to capture detailed security...
In the OSI reference model, on which layer can Ethernet (IEEE 802.3)...
A hard drive is recovered from a submerged vehicle. The drive is...
Laws designed to protect individuals' privacy have been created...
Which of the following is not a form of identification?
Which one of the following is NOT a common security service in the...
All of the following is true about trade secrets EXCEPT:
Which of the following statements BEST describes the extent to which...
An accurate picture of the use and acceptance of biometrics is:
In mandatory access control the system controls access and the owner...
Which of the following is incorrect when considering privilege...
Information systems auditors help the organization:
Wireless transmission technologies include all of the following...
Triage encompasses which of the following incident response...
Which network topology's use of tokens allows prediction of node...
Which one of the following is designed to protect the goodwill and...
All of the following describes link encryption except:
Computer forensics is the marriage of computer science, information...
Which phrase best defines a business continuity/disaster recovery...
If speed is preferred over resilience, which of the following RAID...
Which of the following approaches for identifying appropriate BIA...
Which of the following BEST describes fundamental methods of...
What is an important disadvantage of using a public key algorithm...
Which of the following is a software protection mechanism where all...
What is access control?
When the backup window is not long enough to backup all of the data...
A customer wants to keep cost to a minimum and has only ordered a...
What is the last phase of the TCP/IP three-way handshake sequence?
Which of the following vulnerabilities would best be countered by...
What is the minimum and customary practice of responsible protection...
Each distinguished name (DN) in an LDAP directory represents a...
Information will not be disclosed to any unauthorized person on a...
Audit trails, logs, CCTV, intrusion detection systems, antivirus...
Security is likely to be most expensive when addressed in which phase?
Which of the following processes is concerned with not only...
To which legal and regulatory requirement are all organizations...
Which of the following ISO standards provides the evaluation criteria...
ANSI X9.17 is concerned primarily with
With public key cryptography, confidential messages with proof of...
The NIST document that discusses the Information Security Continuous...
Building security into the application begins at _____________.
When dealing with digital evidence, the chain of custody:
Which of the following models ensures that a subject with a clearance...
The BEST reason to implement additional controls or safeguards is to:
Which of the following evaluation assurance level that is formally...
In the event of a security incident, one of the primary objectives of...
Hamid is reviewing identity management (IDM) products for his...
Which of the following BEST provides a method of quantifying risks...
Which of the following layers of the OSI model offer non-repudiation...
Setting clear security roles has the following benefits:
Which is BEST emphasizes the abstract concepts of law and is...
Which one of the following is true about the criminal law?
Which of the following is a principal security risk of wireless LANs?
Which of the following is NOT an information assurance strategy?
Which is true about link encryption?
Which of the following is NOT associated with the access control...
Which of the following are computer forensics guidelines?
During a disaster recovery test, several billing representatives need...
The elements of risk are as follows:
Benefits of data standards include:
Which security operation control enables checks and balances to reduce...
A Certificate Authority (CA) provides which benefits to a user?
What are the two main testing strategies in software testing?
A system administrator grants rights to a group of individuals called...
Which type of intrusion detection system (IDS) can be considered an...