Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?
Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?A . Layer 2 Tunneling Protocol (L2TP)B . Link Control Protocol (LCP)C . Challenge Handshake Authentication Protocol (CHAP)D . Packet Transfer Protocol (PTP)View AnswerAnswer: B
The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)?
The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)? A. System acquisition and development B. System operations and maintenance C. System initiation D. System implementationView AnswerAnswer: A Explanation: Reference https://online.concordiA.edu/computer-science/system-development-life-cycle-phases/
What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?
What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?A . SignatureB . InferenceC . InductionD . HeuristicView AnswerAnswer: D
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?A . Guaranteed recovery of all business functionsB . Minimization of the need decision making during a crisisC . Insurance against litigation following a disasterD . Protection from loss of organization resourcesView AnswerAnswer: D
Which of the following is TRUE about Disaster Recovery Plan (DRP) testing?
Which of the following is TRUE about Disaster Recovery Plan (DRP) testing?A . Operational networks are usually shut down during testing.B . Testing should continue even if components of the test fail.C . The company is fully prepared for a disaster if all tests pass.D . Testing should not be...
Which of the following could cause a Denial of Service (DoS) against an authentication system?
Which of the following could cause a Denial of Service (DoS) against an authentication system?A . Encryption of audit logsB . No archiving of audit logsC . Hashing of audit logsD . Remote access audit logsView AnswerAnswer: D
Which of the following is a limitation of the Common Vulnerability Scoring System (CVSS) as it relates to conducting code review?
Which of the following is a limitation of the Common Vulnerability Scoring System (CVSS) as it relates to conducting code review?A . It has normalized severity ratings.B . It has many worksheets and practices to implement.C . It aims to calculate the risk of published vulnerabilities.D . It requires a...
Which of the following BEST represents the principle of open design?
Which of the following BEST represents the principle of open design?A . Disassembly, analysis, or reverse engineering will reveal the security functionality of the computer system.B . Algorithms must be protected to ensure the security and interoperability of the designed system.C . A knowledgeable user should have limited privileges on...
In a data classification scheme, the data is owned by the
In a data classification scheme, the data is owned by theA . system security managersB . business managersC . Information Technology (IT) managersD . end usersView AnswerAnswer: B
A continuous information security monitoring program can BEST reduce risk through which of the following?
A continuous information security monitoring program can BEST reduce risk through which of the following?A . Collecting security events and correlating them to identify anomaliesB . Facilitating system-wide visibility into the activities of critical user accountsC . Encompassing people, process, and technologyD . Logging both scheduled and unscheduled system changesView...