Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?A . Layer 2 Tunneling Protocol (L2TP)B . Link Control Protocol (LCP)C . Challenge Handshake Authentication Protocol (CHAP)D . Packet Transfer Protocol (PTP)View AnswerAnswer: B

March 19, 2021 No Comments READ MORE +

The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)?

The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)? A. System acquisition and development B. System operations and maintenance C. System initiation D. System implementationView AnswerAnswer: A Explanation: Reference https://online.concordiA.edu/computer-science/system-development-life-cycle-phases/

March 19, 2021 No Comments READ MORE +

What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?

What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?A . SignatureB . InferenceC . InductionD . HeuristicView AnswerAnswer: D

March 19, 2021 No Comments READ MORE +

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?A . Guaranteed recovery of all business functionsB . Minimization of the need decision making during a crisisC . Insurance against litigation following a disasterD . Protection from loss of organization resourcesView AnswerAnswer: D

March 19, 2021 No Comments READ MORE +

Which of the following is TRUE about Disaster Recovery Plan (DRP) testing?

Which of the following is TRUE about Disaster Recovery Plan (DRP) testing?A . Operational networks are usually shut down during testing.B . Testing should continue even if components of the test fail.C . The company is fully prepared for a disaster if all tests pass.D . Testing should not be...

March 18, 2021 No Comments READ MORE +

Which of the following could cause a Denial of Service (DoS) against an authentication system?

Which of the following could cause a Denial of Service (DoS) against an authentication system?A . Encryption of audit logsB . No archiving of audit logsC . Hashing of audit logsD . Remote access audit logsView AnswerAnswer: D

March 18, 2021 No Comments READ MORE +

Which of the following is a limitation of the Common Vulnerability Scoring System (CVSS) as it relates to conducting code review?

Which of the following is a limitation of the Common Vulnerability Scoring System (CVSS) as it relates to conducting code review?A . It has normalized severity ratings.B . It has many worksheets and practices to implement.C . It aims to calculate the risk of published vulnerabilities.D . It requires a...

March 18, 2021 No Comments READ MORE +

Which of the following BEST represents the principle of open design?

Which of the following BEST represents the principle of open design?A . Disassembly, analysis, or reverse engineering will reveal the security functionality of the computer system.B . Algorithms must be protected to ensure the security and interoperability of the designed system.C . A knowledgeable user should have limited privileges on...

March 18, 2021 No Comments READ MORE +

In a data classification scheme, the data is owned by the

In a data classification scheme, the data is owned by theA . system security managersB . business managersC . Information Technology (IT) managersD . end usersView AnswerAnswer: B

March 18, 2021 No Comments READ MORE +

A continuous information security monitoring program can BEST reduce risk through which of the following?

A continuous information security monitoring program can BEST reduce risk through which of the following?A . Collecting security events and correlating them to identify anomaliesB . Facilitating system-wide visibility into the activities of critical user accountsC . Encompassing people, process, and technologyD . Logging both scheduled and unscheduled system changesView...

March 18, 2021 No Comments READ MORE +