Which one of the following security mechanisms provides the BEST way to restrict the execution of privileged procedures?
Which one of the following security mechanisms provides the BEST way to restrict the execution of privileged procedures?A . Role Based Access Control (RBAC)B . Biometric access controlC . Federated Identity Management (IdM)D . Application hardeningView AnswerAnswer: A
Which of the following is the FIRST step in the incident response process?
Which of the following is the FIRST step in the incident response process?A . Determine the cause of the incidentB . Disconnect the system involved from the networkC . Isolate and contain the system involvedD . Investigate all symptoms to confirm the incidentView AnswerAnswer: D
In which of the following programs is it MOST important to include the collection of security process data?
In which of the following programs is it MOST important to include the collection of security process data?A . Quarterly access reviewsB . Security continuous monitoringC . Business continuity testingD . Annual security trainingView AnswerAnswer: A
Which of the following is a PRIMARY advantage of using a third-party identity service?
Which of the following is a PRIMARY advantage of using a third-party identity service?A . Consolidation of multiple providersB . Directory synchronizationC . Web based logonD . Automated account managementView AnswerAnswer: D
Which of the following mobile code security models relies only on trust?
Which of the following mobile code security models relies only on trust?A . Code signingB . Class authenticationC . SandboxingD . Type safetyView AnswerAnswer: A
What MUST an administrator review to audit a user’s access to data files?
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?A . Host VM monitor audit logsB . Guest OS access controlsC . Host VM access controlsD . Guest OS audit logsView AnswerAnswer:...
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?A . Packet filteringB . Port services filteringC . Content filteringD . Application access controlView AnswerAnswer: A
With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?
With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?A . Continuously without exception for all security controlsB . Before and after each change of the controlC . At a rate concurrent with the volatility of the security controlD . Only during system...
What would be the MOST probable cause?
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?A . Absence of a Business Intelligence (BI) solutionB . Inadequate cost modelingC . Improper deployment of the Service-Oriented Architecture (SOA)D . Insufficient Service...
Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring?
Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring?A . Cross Origin Resource Sharing (CORS)B . WebSocketsC . Document Object Model (DOM) treesD . Web Interface Definition Language (IDL)View AnswerAnswer: B