Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?A . WEP uses a small range Initialization Vector (IV)B . WEP uses Message Digest 5 (MD5)C . WEP uses Diffie-HellmanD . WEP does not use any Initialization Vector (IV)View AnswerAnswer: A

March 23, 2021 No Comments READ MORE +

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?A . Examine the device for physical tamperingB . Implement more stringent baseline configurationsC . Purge or re-image the hard disk driveD . Change access codesView AnswerAnswer: D

March 23, 2021 No Comments READ MORE +

Which one of the following considerations has the LEAST impact when considering transmission security?

Which one of the following considerations has the LEAST impact when considering transmission security?A . Network availabilityB . Data integrityC . Network bandwidthD . Node locationsView AnswerAnswer: C

March 23, 2021 No Comments READ MORE +

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?A . WalkthroughB . SimulationC . ParallelD . White boxView AnswerAnswer: C

March 23, 2021 No Comments READ MORE +

What is the MOST important consideration from a data security perspective when an organization plans to relocate?

What is the MOST important consideration from a data security perspective when an organization plans to relocate?A . Ensure the fire prevention and detection systems are sufficient to protect personnelB . Review the architectural plans to determine how many emergency exits are presentC . Conduct a gap analysis of a...

March 23, 2021 No Comments READ MORE +

Which of the following can BEST prevent security flaws occurring in outsourced software development?

Which of the following can BEST prevent security flaws occurring in outsourced software development?A . Contractual requirements for code qualityB . Licensing, code ownership and intellectual property rightsC . Certification of the quality and accuracy of the work doneD . Delivery dates, change management control and budgetary controlView AnswerAnswer: C

March 22, 2021 No Comments READ MORE +

When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?A . Only when assets are clearly definedB . Only when standards are definedC . Only when controls are put in placeD . Only procedures...

March 22, 2021 No Comments READ MORE +

Which of the following is a potential risk when a program runs in privileged mode?

Which of the following is a potential risk when a program runs in privileged mode?A . It may serve to create unnecessary code complexityB . It may not enforce job separation dutiesC . It may create unnecessary application hardeningD . It may allow malicious code to be insertedView AnswerAnswer: D

March 22, 2021 No Comments READ MORE +

Which of the following is considered best practice for preventing e-mail spoofing?

Which of the following is considered best practice for preventing e-mail spoofing?A . Spam filteringB . Cryptographic signatureC . Uniform Resource Locator (URL) filteringD . Reverse Domain Name Service (DNS) lookupView AnswerAnswer: B

March 22, 2021 No Comments READ MORE +

The FIRST step in building a firewall is to

The FIRST step in building a firewall is toA . assign the roles and responsibilities of the firewall administrators.B . define the intended audience who will read the firewall policy.C . identify mechanisms to encourage compliance with the policy.D . perform a risk analysis to identify issues to be addressed.View...

March 22, 2021 No Comments READ MORE +