Which of the following refers to a location away from the computer...
Which layer is not part of the OSI model?
Defining technology security architecture in relationship with other...
Which of the following is NOT a natural environmental threat that an...
Remote Access does what of the following?
The doors of a data center spring open in the event of a fire....
When outsourcing IT systems
Encryption is converting a message from ciphertext to plaintext.
Define and detail the aspects of password selection that distinguish...
It can be said that IPSec
A botnet can be characterized as
__________ requires that a user of process be granted access to only...
The major benefit of information classification is to
Test outputs should be compared against expected outputs.
Effective security management:
The integrity of a forensic bit stream image is determined by:
The monitoring of outbound network traffic for indicators of...
Modifying identifying information so as to make communication appear...
A disadvantage of single sign-on is
Which one is a benefit of a enterprise security architecture?
When sensitive information is no longer critical but still within...
What is not mentioned as a phase of an incident response?
Polyalphabetic encryption techniques use multiple alphabets for each...
To maintain the security architecture, of the following, which is...
The best way to ensure that there is no data remanence of sensitive...
Which of the following terms refers to a mechanism which proves that...
What type of risk remains after the implementation of new or enhanced...
Which of the following BEST describe three separate functions of CCTV?
Which of the following ensures constant redundancy and...
Role-based access control
NIST identifies three service models that represent different types of...
Which of the following is the technology of indoor environmental...
A new installation requires a network in a heavy manufacturing area...
The strategy of forming layers of protection around an asset or...
Which one of the following is a common system component in the system...
Which of the following is responsible for maintaining certificates in...
Which of the following is most likely to detect DoS attacks?
Assuming a working IDS is in place, which of the following groups is...
An emerging concept of highly-interconnected physical devices with...
A guard dog patrolling the perimeter of a data center is what type of...
A potential vulnerability of the Kerberos authentication server is
Before applying a software update to production systems, it is MOST...
Which of the following methods is not acceptable for exercising the...
Within the realm of IT security, which of the following combinations...
In which of the following alternative site configurations is the...
The best way to ensure that there is no data remanence of sensitive...
Attempting to crack a password by using common words from a text file...
Which of the following security standards is internationally...
Which of the following uses a Key Distribution Center (KDC) to...
Which of the following is the technology of indoor environmental...
The vast majority of Virtual Private Networks use
Which of the following terms BEST describes the effort to determine...
What type of malware uses social engineering to trick a victim into...
Which regulatory guidance pertains to any company that is publicly...
A customer requests to connect their LAN to the internet. Which of the...
Recently passed over for an executive promotion, Carol is anxious to...
Which of the following is not a characteristic of continuous...
Which of the following end-point devices would MOST likely be...
What type of analysis emphasizes the formal study of what your...
Which of the following describes the type of anti-virus software that...
What are the three types of access control?
Asymmetric key cryptography is used for the following:
The only cipher system said to be unbreakable by brute force is
Since 9/11, airport parking garages now keep cars further away from...
Wi-Fi Protected Access (WPA-2) uses Advanced Encryption Standard (AES)...
When malware infects a host and allows it to be used in a botnet for...
Data access decisions are best made by:
Which of the following is part of the five rules of evidence?
When a certificate is revoked, what is the proper procedure?
How are smart cards and memory cars functionally different?
Network information services (NIS) are used for what processes?
What is the best protection measure against unauthorized access to...
Which of the following is MOST important for successful business...
Security awareness training includes:
Many organizations purchase insurance policies to provide various...
What is the BEST means of protecting the physical devices associated...
Which of the following forms of attack can be used to disrupt even the...
Which one do you like?
When sensitive information is no longer critical but still within...
Which of the following BEST determines the employment suitability of...
Which of the following is correct about dynamic testing?
Authentication is
Management should decide when a system should be returned to...
Sam is a software developer and has recently gone through secure...
Which is a fundamental disadvantage of biometrics?
Which of the following is true about maintaining the chain of custody...
Which of the following is NOT a consideration when choosing data...
Which of the following categories of access control implementation...
What protocol solicits MAC address from devices on the network without...
Which of the following supports asymmetric key cryptography?
The main difference between a Security Event Information Management...
Administrative law is concerned with confining government power,...
Which of the following is not one of the four typical elements of a...
What is the output length of a RIPEMD-160 hash?
Ann installs a new Wireless Access Point (WAP) and users are able to...
Before applying a software update to production systems, it is MOST...
Which is the BEST choice for implementing encryption on a smart card?
To ensure proper forensics action when needed, an incident response...
Multi-layer protocols such as Modbus used in industrial control...
Collusion is best mitigated by:
Protection practices that can be used to prevent man-in-the middle...
Which of the following attacks allow bypassing access control lists on...
A Service Organization Control (SOC) Report commonly covers a
Which intrusion detection system's efficiency decreases with...
What are the seven main categories of access control?
A Security Event Management (SEM) service performs the following...
Which protocol offers native encryption capability, for both...
Formal acceptance of an evaluated system by management is known as:
Which type of law is derived from court decisions and codification of...
Which cable has a relatively low-speed transmission medium consisting...
Managing the dialogue between two or more communicating devices is...
Which of the following steps should be performed first in a business...
The (ISC)2 code of ethics resolves conflicts between canons by:
Cross-functional teams formed to conceptualize, design, test, produce,...
The key to a successful physical protection system is the integration...
Single loss expectancy (SLE) is calculated by using:
Which of the following electronically stored information (ESI) are not...
What is the optimal placement for network-based intrusion detection...
At a restricted facility, visitors are requested to provide...
Which one of the following describes the Information Technology...
Which of the following is the primary desired result of any...
Sam is a software developer and has recently gone through secure...
A service's recovery point objective is zero. Which approach...
Good data management practices include:
Which of the following processes identifies the threats that can...
What are types of failures in biometric identification systems?
A basic component of an industrial control system (ICS) that is most...
Well-written security program policies are BEST reviewed:
Users are reporting that some Internet websites are not accessible...
Which of the following can BEST be used to capture detailed security...
Of the following plans, which is designed to protect critical business...
In the OSI reference model, on which layer can Ethernet (IEEE 802.3)...
What would be the most appropriate interior sensor used for a building...
Which of the following is not a form of identification?
What are the FOUR phases of the equipment lifecycle?
Your office is implementing an access control policy based on...
A hard drive is recovered from a submerged vehicle. The drive is...
Laws designed to protect individuals' privacy have been created...
Frame Relay and X.25 networks are part of which of the following?
An accurate picture of the use and acceptance of biometrics is:
Substitution is mixing the location of plaintext throughout the...
Which one of the following is NOT a common security service in the...
Which network topology's use of tokens allows prediction of node...
Which of the following statements BEST describes the extent to which...
In mandatory access control the system controls access and the owner...
All of the following describes link encryption except:
All of the following is true about trade secrets EXCEPT:
Wireless transmission technologies include all of the following...
Triage encompasses which of the following incident response...
Which of the following approaches for identifying appropriate BIA...
Which of the following is incorrect when considering privilege...
Computer forensics is the marriage of computer science, information...
Information systems auditors help the organization:
Which phrase best defines a business continuity/disaster recovery...
Which one of the following is designed to protect the goodwill and...
What is the last phase of the TCP/IP three-way handshake sequence?
Which of the following vulnerabilities would best be countered by...
Which of the following is a software protection mechanism where all...
If speed is preferred over resilience, which of the following RAID...
With public key cryptography, confidential messages with proof of...
Which of the following BEST describes fundamental methods of...
What is an important disadvantage of using a public key algorithm...
What is the minimum and customary practice of responsible protection...
Security is likely to be most expensive when addressed in which phase?
Each distinguished name (DN) in an LDAP directory represents a...
Which of the following processes is concerned with not only...
What is access control?
Which of the following ISO standards provides the evaluation criteria...
When the backup window is not long enough to backup all of the data...
A customer wants to keep cost to a minimum and has only ordered a...
Hamid is reviewing identity management (IDM) products for his...
Building security into the application begins at _____________.
When dealing with digital evidence, the chain of custody:
Which of the following models ensures that a subject with a clearance...
Which of the following evaluation assurance level that is formally...
ANSI X9.17 is concerned primarily with
In the event of a security incident, one of the primary objectives of...
Information will not be disclosed to any unauthorized person on a...
Which of the following layers of the OSI model offer non-repudiation...
The NIST document that discusses the Information Security Continuous...
Audit trails, logs, CCTV, intrusion detection systems, antivirus...
To which legal and regulatory requirement are all organizations...
Setting clear security roles has the following benefits:
The BEST reason to implement additional controls or safeguards is to:
Which is true about link encryption?
Which of the following BEST provides a method of quantifying risks...
Which of the following is NOT associated with the access control...
Which of the following are computer forensics guidelines?
During a disaster recovery test, several billing representatives need...
Which one of the following is true about the criminal law?
Benefits of data standards include:
Which of the following is NOT an information assurance strategy?
Which is BEST emphasizes the abstract concepts of law and is...
Which of the following is a principal security risk of wireless LANs?
A system administrator grants rights to a group of individuals called...
The elements of risk are as follows:
Which security operation control enables checks and balances to reduce...
A two-dimensional grouping of individual subjects into groups or roles...
Which of the following can help with ensuring that only the needed...
A Certificate Authority (CA) provides which benefits to a user?