Which of the following is an initial consideration when developing an information security management system?

Which of the following is an initial consideration when developing an information security management system?A . Identify the contractual security obligations that apply to the organizationsB . Understand the value of the information assetsC . Identify the level of residual risk that is tolerable to managementD . Identify relevant legislative...

August 21, 2021 No Comments READ MORE +

Why must all users be positively identified prior to using multi-user computers?

Why must all users be positively identified prior to using multi-user computers?A . To provide access to system privilegesB . To provide access to the operating systemC . To ensure that unauthorized persons cannot access the computersD . To ensure that management knows what users are currently logged onView AnswerAnswer:...

August 20, 2021 No Comments READ MORE +

The process of mutual authentication involves a computer system authenticating a user and authenticating the

The process of mutual authentication involves a computer system authenticating a user and authenticating theA . user to the audit process.B . computer system to the user.C . user's access to all authorized objects.D . computer system to the audit process.View AnswerAnswer: B

August 20, 2021 No Comments READ MORE +

When implementing a data classification program, why is it important to avoid too much granularity?

When implementing a data classification program, why is it important to avoid too much granularity?A . The process will require too many resourcesB . It will be difficult to apply to both hardware and softwareC . It will be difficult to assign ownership to the dataD . The process will...

August 20, 2021 No Comments READ MORE +

Intellectual property rights are PRIMARY concerned with which of the following?

Intellectual property rights are PRIMARY concerned with which of the following?A . Owner’s ability to realize financial gainB . Owner’s ability to maintain copyrightC . Right of the owner to enjoy their creationD . Right of the owner to control delivery methodView AnswerAnswer: C

August 20, 2021 No Comments READ MORE +

What is the MOST effective countermeasure to a malicious code attack against a mobile system?

What is the MOST effective countermeasure to a malicious code attack against a mobile system?A . SandboxB . Change controlC . Memory managementD . Public-Key Infrastructure (PKI)View AnswerAnswer: A

August 20, 2021 No Comments READ MORE +

What is the MOST important consideration from a data security perspective when an organization plans to relocate?

What is the MOST important consideration from a data security perspective when an organization plans to relocate?A . Ensure the fire prevention and detection systems are sufficient to protect personnelB . Review the architectural plans to determine how many emergency exits are presentC . Conduct a gap analysis of a...

August 20, 2021 No Comments READ MORE +

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?

Topic 4, . Communication and Network Security Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?A . Intrusion Prevention Systems (IPS)B . Intrusion Detection Systems (IDS)C . Stateful firewallsD . Network Behavior Analysis (NBA) toolsView AnswerAnswer: D

August 20, 2021 No Comments READ MORE +

Which of the following could cause a Denial of Service (DoS) against an authentication system?

Which of the following could cause a Denial of Service (DoS) against an authentication system?A . Encryption of audit logsB . No archiving of audit logsC . Hashing of audit logsD . Remote access audit logsView AnswerAnswer: D

August 19, 2021 No Comments READ MORE +

Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?

Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?A . ConfidentialityB . IntegrityC . IdentificationD . AvailabilityView AnswerAnswer: C

August 19, 2021 No Comments READ MORE +