Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to what?
Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to what?A . Interface with the Public Key Infrastructure (PKI)B . Improve the quality of security softwareC . Prevent Denial of Service (DoS) attacksD . Establish a secure initial stateView AnswerAnswer:...
Passive Infrared Sensors (PIR) used in a non-climate controlled environment should
Passive Infrared Sensors (PIR) used in a non-climate controlled environment shouldA . reduce the detected object temperature in relation to the background temperature.B . increase the detected object temperature in relation to the background temperature.C . automatically compensate for variance in background temperature.D . detect objects of a specific temperature...
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?A . Lack of software documentationB . License agreements requiring release of modified codeC . Expiration of the license agreementD . Costs associated with support of the softwareView AnswerAnswer: D
What principle requires that changes to the plaintext affect many parts of the ciphertext?
What principle requires that changes to the plaintext affect many parts of the ciphertext?A . DiffusionB . EncapsulationC . ObfuscationD . PermutationView AnswerAnswer: A
Which one of these risk factors would be the LEAST important consideration in choosing a building site for a new computer facility?
Which one of these risk factors would be the LEAST important consideration in choosing a building site for a new computer facility?A . Vulnerability to crimeB . Adjacent buildings and businessesC . Proximity to an airline flight pathD . Vulnerability to natural disastersView AnswerAnswer: C
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?A . Audit logsB . Role-Based Access Control (RBAC)C . Two-factor authenticationD . Application of least privilegeView AnswerAnswer: B
Which security action should be taken FIRST when computer personnel are terminated from their jobs?
Which security action should be taken FIRST when computer personnel are terminated from their jobs?A . Remove their computer accessB . Require them to turn in their badgeC . Conduct an exit interviewD . Reduce their physical access level to the facilityView AnswerAnswer: A
Which of the following is a strategy of grouping requirements in developing a Security Test and Evaluation (ST&E)?
Which of the following is a strategy of grouping requirements in developing a Security Test and Evaluation (ST&E)?A . Standards, policies, and proceduresB . Tactical, strategic, and financialC . Management, operational, and technicalD . Documentation, observation, and manualView AnswerAnswer: C
To prevent inadvertent disclosure of restricted information, which of the following would be the LEAST effective process for eliminating data prior to the media being discarded?
To prevent inadvertent disclosure of restricted information, which of the following would be the LEAST effective process for eliminating data prior to the media being discarded?A . Multiple-pass overwritingB . DegaussingC . High-level formattingD . Physical destructionView AnswerAnswer: C
What is the purpose of an Internet Protocol (IP) spoofing attack?
What is the purpose of an Internet Protocol (IP) spoofing attack?A . To send excessive amounts of data to a process, making it unpredictableB . To intercept network traffic without authorizationC . To disguise the destination address from a target’s IP filtering devicesD . To convince a system that it...