What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?

What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?A . Warm siteB . Hot siteC . Mirror siteD . Cold siteView AnswerAnswer: A

August 13, 2021 No Comments READ MORE +

Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?

Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?A . Personal Identity Verification (PIV)B . Cardholder Unique Identifier (CHUID) authenticationC . Physical Access Control System (PACS) repeated attempt detectionD . Asymmetric Card Authentication Key (CAK) challenge-responseView AnswerAnswer: A

August 13, 2021 No Comments READ MORE +

Which of the following statements is TRUE of black box testing?

Which of the following statements is TRUE of black box testing?A . Only the functional specifications are known to the test planner.B . Only the source code and the design documents are known to the test planner.C . Only the source code and functional specifications are known to the test...

August 12, 2021 No Comments READ MORE +

Which of the following is the best practice for testing a Business Continuity Plan (BCP)?

Which of the following is the best practice for testing a Business Continuity Plan (BCP)?A . Test before the IT AuditB . Test when environment changesC . Test after installation of security patchesD . Test after implementation of system patchesView AnswerAnswer: B

August 12, 2021 No Comments READ MORE +

The stringency of an Information Technology (IT) security assessment will be determined by the

The stringency of an Information Technology (IT) security assessment will be determined by the A. system's past security record. B. size of the system's database. C. sensitivity of the system's datA. D. age of the system.View AnswerAnswer: C

August 12, 2021 No Comments READ MORE +

Which of the following BEST represents the principle of open design?

Which of the following BEST represents the principle of open design?A . Disassembly, analysis, or reverse engineering will reveal the security functionality of the computer system.B . Algorithms must be protected to ensure the security and interoperability of the designed system.C . A knowledgeable user should have limited privileges on...

August 12, 2021 No Comments READ MORE +

Which of the following represents the GREATEST risk to data confidentiality?

Which of the following represents the GREATEST risk to data confidentiality?A . Network redundancies are not implementedB . Security awareness training is not completedC . Backup tapes are generated unencryptedD . Users have administrative privilegesView AnswerAnswer: C

August 12, 2021 No Comments READ MORE +

Which of the following is the PRIMARY risk with using open source software in a commercial software construction?

Which of the following is the PRIMARY risk with using open source software in a commercial software construction?A . Lack of software documentationB . License agreements requiring release of modified codeC . Expiration of the license agreementD . Costs associated with support of the softwareView AnswerAnswer: D

August 12, 2021 No Comments READ MORE +

A disadvantage of an application filtering firewall is that it can lead to

A disadvantage of an application filtering firewall is that it can lead toA . a crash of the network as a result of user activities.B . performance degradation due to the rules applied.C . loss of packets on the network due to insufficient bandwidth.D . Internet Protocol (IP) spoofing by...

August 12, 2021 No Comments READ MORE +

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?A . Transport layerB . Application layerC . Network layerD . Session layerView AnswerAnswer: A

August 12, 2021 No Comments READ MORE +