By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol (TCP/IP) with a Storage Area Network (SAN), the
By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol (TCP/IP) with a Storage Area Network (SAN), theA . confidentiality of the traffic is protected.B . opportunity to sniff network traffic exists.C . opportunity for device identity spoofing is eliminated.D . storage devices are protected against availability...
In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?
In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?A . Transport layerB . Application layerC . Network layerD . Session layerView AnswerAnswer: A
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?A . Development, testing, and deploymentB . Prevention, detection, and remediationC . People, technology, and operationsD . Certification, accreditation, and monitoringView AnswerAnswer: C
Which of the following is the FIRST step of a penetration test plan?
Which of the following is the FIRST step of a penetration test plan?A . Analyzing a network diagram of the target networkB . Notifying the company's customersC . Obtaining the approval of the company's managementD . Scheduling the penetration test during a period of least impactView AnswerAnswer: C
Which method of information gathering has the attacker used?
While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?A . Trusted pathB . Malicious logicC . Social engineeringD . Passive misuseView AnswerAnswer: C
What security management control is MOST often broken by collusion?
What security management control is MOST often broken by collusion?A . Job rotationB . Separation of dutiesC . Least privilege modelD . Increased monitoringView AnswerAnswer: B
Which of the following is of GREATEST assistance to auditors when reviewing system configurations?
Which of the following is of GREATEST assistance to auditors when reviewing system configurations?A . Change management processesB . User administration proceduresC . Operating System (OS) baselinesD . System backup documentationView AnswerAnswer: A
Intellectual property rights are PRIMARY concerned with which of the following?
Intellectual property rights are PRIMARY concerned with which of the following?A . Owner’s ability to realize financial gainB . Owner’s ability to maintain copyrightC . Right of the owner to enjoy their creationD . Right of the owner to control delivery methodView AnswerAnswer: D
A practice that permits the owner of a data object to grant other users access to that object would usually provide
A practice that permits the owner of a data object to grant other users access to that object would usually provideA . Mandatory Access Control (MAC).B . owner-administered control.C . owner-dependent access control.D . Discretionary Access Control (DAC).View AnswerAnswer: D
What is the MOST probable security feature of Java preventing the program from operating as intended?
A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected. What is the MOST probable security feature of Java preventing the program from operating as intended?A . Least privilegeB...