By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol (TCP/IP) with a Storage Area Network (SAN), the

By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol (TCP/IP) with a Storage Area Network (SAN), theA . confidentiality of the traffic is protected.B . opportunity to sniff network traffic exists.C . opportunity for device identity spoofing is eliminated.D . storage devices are protected against availability...

March 27, 2021 No Comments READ MORE +

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?A . Transport layerB . Application layerC . Network layerD . Session layerView AnswerAnswer: A

March 27, 2021 No Comments READ MORE +

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?A . Development, testing, and deploymentB . Prevention, detection, and remediationC . People, technology, and operationsD . Certification, accreditation, and monitoringView AnswerAnswer: C

March 27, 2021 No Comments READ MORE +

Which of the following is the FIRST step of a penetration test plan?

Which of the following is the FIRST step of a penetration test plan?A . Analyzing a network diagram of the target networkB . Notifying the company's customersC . Obtaining the approval of the company's managementD . Scheduling the penetration test during a period of least impactView AnswerAnswer: C

March 27, 2021 No Comments READ MORE +

Which method of information gathering has the attacker used?

While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?A . Trusted pathB . Malicious logicC . Social engineeringD . Passive misuseView AnswerAnswer: C

March 26, 2021 No Comments READ MORE +

What security management control is MOST often broken by collusion?

What security management control is MOST often broken by collusion?A . Job rotationB . Separation of dutiesC . Least privilege modelD . Increased monitoringView AnswerAnswer: B

March 26, 2021 No Comments READ MORE +

Which of the following is of GREATEST assistance to auditors when reviewing system configurations?

Which of the following is of GREATEST assistance to auditors when reviewing system configurations?A . Change management processesB . User administration proceduresC . Operating System (OS) baselinesD . System backup documentationView AnswerAnswer: A

March 26, 2021 No Comments READ MORE +

Intellectual property rights are PRIMARY concerned with which of the following?

Intellectual property rights are PRIMARY concerned with which of the following?A . Owner’s ability to realize financial gainB . Owner’s ability to maintain copyrightC . Right of the owner to enjoy their creationD . Right of the owner to control delivery methodView AnswerAnswer: D

March 26, 2021 No Comments READ MORE +

A practice that permits the owner of a data object to grant other users access to that object would usually provide

A practice that permits the owner of a data object to grant other users access to that object would usually provideA . Mandatory Access Control (MAC).B . owner-administered control.C . owner-dependent access control.D . Discretionary Access Control (DAC).View AnswerAnswer: D

March 26, 2021 No Comments READ MORE +

What is the MOST probable security feature of Java preventing the program from operating as intended?

A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected. What is the MOST probable security feature of Java preventing the program from operating as intended?A . Least privilegeB...

March 26, 2021 No Comments READ MORE +