Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?A . WEP uses a small range Initialization Vector (IV)B . WEP uses Message Digest 5 (MD5)C . WEP uses Diffie-HellmanD . WEP does not use any Initialization Vector (IV)View AnswerAnswer: A
Which of the following actions will reduce risk to a laptop before traveling to a high risk area?
Which of the following actions will reduce risk to a laptop before traveling to a high risk area?A . Examine the device for physical tamperingB . Implement more stringent baseline configurationsC . Purge or re-image the hard disk driveD . Change access codesView AnswerAnswer: D
Which one of the following considerations has the LEAST impact when considering transmission security?
Which one of the following considerations has the LEAST impact when considering transmission security?A . Network availabilityB . Data integrityC . Network bandwidthD . Node locationsView AnswerAnswer: C
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?A . WalkthroughB . SimulationC . ParallelD . White boxView AnswerAnswer: C
What is the MOST important consideration from a data security perspective when an organization plans to relocate?
What is the MOST important consideration from a data security perspective when an organization plans to relocate?A . Ensure the fire prevention and detection systems are sufficient to protect personnelB . Review the architectural plans to determine how many emergency exits are presentC . Conduct a gap analysis of a...
Which of the following can BEST prevent security flaws occurring in outsourced software development?
Which of the following can BEST prevent security flaws occurring in outsourced software development?A . Contractual requirements for code qualityB . Licensing, code ownership and intellectual property rightsC . Certification of the quality and accuracy of the work doneD . Delivery dates, change management control and budgetary controlView AnswerAnswer: C
When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?
When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?A . Only when assets are clearly definedB . Only when standards are definedC . Only when controls are put in placeD . Only procedures...
Which of the following is a potential risk when a program runs in privileged mode?
Which of the following is a potential risk when a program runs in privileged mode?A . It may serve to create unnecessary code complexityB . It may not enforce job separation dutiesC . It may create unnecessary application hardeningD . It may allow malicious code to be insertedView AnswerAnswer: D
Which of the following is considered best practice for preventing e-mail spoofing?
Which of the following is considered best practice for preventing e-mail spoofing?A . Spam filteringB . Cryptographic signatureC . Uniform Resource Locator (URL) filteringD . Reverse Domain Name Service (DNS) lookupView AnswerAnswer: B
The FIRST step in building a firewall is to
The FIRST step in building a firewall is toA . assign the roles and responsibilities of the firewall administrators.B . define the intended audience who will read the firewall policy.C . identify mechanisms to encourage compliance with the policy.D . perform a risk analysis to identify issues to be addressed.View...