What is the MOST effective implementation for ensuring data privacy?
Sensitive customer data is going to be added to a database. What is the MOST effective implementation for ensuring data privacy?A . Mandatory Access Control (MAC) proceduresB . Discretionary Access Control (DAC) proceduresC . Segregation of dutiesD . Data link encryptionView AnswerAnswer: A
Which of the following MUST be in place to recognize a system attack?
Which of the following MUST be in place to recognize a system attack?A . Stateful firewallB . Distributed antivirusC . Log analysisD . Passive honeypotView AnswerAnswer: A
What is the purpose of an Internet Protocol (IP) spoofing attack?
What is the purpose of an Internet Protocol (IP) spoofing attack?A . To send excessive amounts of data to a process, making it unpredictableB . To intercept network traffic without authorizationC . To disguise the destination address from a target’s IP filtering devicesD . To convince a system that it...
What would be the BEST method used by a forensic examiner to isolate the powered-on device from the network and preserve the evidence?
A company seizes a mobile device suspected of being used in committing fraud. What would be the BEST method used by a forensic examiner to isolate the powered-on device from the network and preserve the evidence?A . Put the device in airplane modeB . Suspend the account with the telecommunication...
A minimal implementation of endpoint security includes which of the following?
A minimal implementation of endpoint security includes which of the following?A . Trusted platformsB . Host-based firewallsC . Token-based authenticationD . Wireless Access Points (AP)View AnswerAnswer: A
Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?
Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?A . Install mantraps at the building entrancesB . Enclose the personnel entry area with polycarbonate plasticC . Supply a duress alarm for personnel exposed to the...
Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?
Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?A . Common Vulnerabilities and Exposures (CVE)B . Common Vulnerability Scoring System (CVSS)C . Asset Reporting Format (ARF)D . Open Vulnerability and Assessment Language (OVAL)View AnswerAnswer: B
In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?
In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?A . Transport layerB . Application layerC . Network layerD . Session layerView AnswerAnswer: A
Which of the following is MOST appropriate for protecting confidentially of data stored on a hard drive?
Which of the following is MOST appropriate for protecting confidentially of data stored on a hard drive?A . Triple Data Encryption Standard (3DES)B . Advanced Encryption Standard (AES)C . Message Digest 5 (MD5)D . Secure Hash Algorithm 2(SHA-2)View AnswerAnswer: B
Which of the following BEST describes the responsibilities of a data owner?
Which of the following BEST describes the responsibilities of a data owner?A . Ensuring quality and validation through periodic audits for ongoing data integrityB . Maintaining fundamental data availability, including data storage and archivingC . Ensuring accessibility to appropriate users, maintaining appropriate levels of data securityD . Determining the impact...