Internet Protocol (IP) source address spoofing is used to defeat
Internet Protocol (IP) source address spoofing is used to defeatA . address-based authentication.B . Address Resolution Protocol (ARP).C . Reverse Address Resolution Protocol (RARP).D . Transmission Control Protocol (TCP) hijacking.View AnswerAnswer: A
In a data classification scheme, the data is owned by the
In a data classification scheme, the data is owned by theA . system security managersB . business managersC . Information Technology (IT) managersD . end usersView AnswerAnswer: B
Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?
Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?A . PhysicalB . SessionC . TransportD . Data-LinkView AnswerAnswer: C
Which of the following failures should the IT manager be concerned with?
Topic 1, Security and Risk Management A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?A . ApplicationB . StorageC . PowerD . NetworkView...
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?A . Link layerB . Physical layerC . Session layerD . Application layerView AnswerAnswer: D
The type of authorized interactions a subject can have with an object is
The type of authorized interactions a subject can have with an object isA . control.B . permission.C . procedure.D . protocol.View AnswerAnswer: B
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?A . Implementation PhaseB . Initialization PhaseC . Cancellation PhaseD . Issued PhaseView AnswerAnswer: D
What security management control is MOST often broken by collusion?
What security management control is MOST often broken by collusion?A . Job rotationB . Separation of dutiesC . Least privilege modelD . Increased monitoringView AnswerAnswer: B
To which of the following might this system have been subjected?
A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?A . Trojan horseB . Denial of Service (DoS)C . SpoofingD . Man-in-the-Middle (MITM)View AnswerAnswer: A
Which type of control recognizes that a transaction amount is excessive in accordance with corporate policy?
Which type of control recognizes that a transaction amount is excessive in accordance with corporate policy?A . DetectionB . PreventionC . InvestigationD . CorrectionView AnswerAnswer: A