Internet Protocol (IP) source address spoofing is used to defeat

Internet Protocol (IP) source address spoofing is used to defeatA . address-based authentication.B . Address Resolution Protocol (ARP).C . Reverse Address Resolution Protocol (RARP).D . Transmission Control Protocol (TCP) hijacking.View AnswerAnswer: A

August 19, 2021 No Comments READ MORE +

In a data classification scheme, the data is owned by the

In a data classification scheme, the data is owned by theA . system security managersB . business managersC . Information Technology (IT) managersD . end usersView AnswerAnswer: B

August 19, 2021 No Comments READ MORE +

Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?

Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?A . PhysicalB . SessionC . TransportD . Data-LinkView AnswerAnswer: C

August 19, 2021 No Comments READ MORE +

Which of the following failures should the IT manager be concerned with?

Topic 1, Security and Risk Management A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?A . ApplicationB . StorageC . PowerD . NetworkView...

August 19, 2021 No Comments READ MORE +

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?A . Link layerB . Physical layerC . Session layerD . Application layerView AnswerAnswer: D

August 19, 2021 No Comments READ MORE +

The type of authorized interactions a subject can have with an object is

The type of authorized interactions a subject can have with an object isA . control.B . permission.C . procedure.D . protocol.View AnswerAnswer: B

August 18, 2021 No Comments READ MORE +

What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?

What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?A . Implementation PhaseB . Initialization PhaseC . Cancellation PhaseD . Issued PhaseView AnswerAnswer: D

August 18, 2021 No Comments READ MORE +

What security management control is MOST often broken by collusion?

What security management control is MOST often broken by collusion?A . Job rotationB . Separation of dutiesC . Least privilege modelD . Increased monitoringView AnswerAnswer: B

August 18, 2021 No Comments READ MORE +

To which of the following might this system have been subjected?

A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?A . Trojan horseB . Denial of Service (DoS)C . SpoofingD . Man-in-the-Middle (MITM)View AnswerAnswer: A

August 18, 2021 No Comments READ MORE +

Which type of control recognizes that a transaction amount is excessive in accordance with corporate policy?

Which type of control recognizes that a transaction amount is excessive in accordance with corporate policy?A . DetectionB . PreventionC . InvestigationD . CorrectionView AnswerAnswer: A

August 18, 2021 No Comments READ MORE +