Which of the following mechanisms will BEST prevent a Cross-Site Request Forgery (CSRF) attack?
Which of the following mechanisms will BEST prevent a Cross-Site Request Forgery (CSRF) attack?A . parameterized database queriesB . whitelist input valuesC . synchronized session tokensD . use strong ciphersView AnswerAnswer: C
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?A . Link layerB . Physical layerC . Session layerD . Application layerView AnswerAnswer: D
Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?
Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?A . Personal Identity Verification (PIV)B . Cardholder Unique Identifier (CHUID) authenticationC . Physical Access Control System (PACS) repeated attempt detectionD . Asymmetric Card Authentication Key (CAK) challenge-responseView AnswerAnswer: C
Which security modes is MOST commonly used in a commercial environment because it protects the integrity of financial and accounting data?
Which security modes is MOST commonly used in a commercial environment because it protects the integrity of financial and accounting data?A . BibaB . Graham-DenningC . Clark-WilsonD . Beil-LaPadulaView AnswerAnswer: C
Which of the following MUST be part of a contract to support electronic discovery of data stored in a cloud environment?
Which of the following MUST be part of a contract to support electronic discovery of data stored in a cloud environment?A . identification of data locationB . integration with organizational directory services for authenticationC . accommodation of hybrid deployment modelsD . tokenization of dataView AnswerAnswer: A
Which factors MUST be considered when classifying information and supporting assets for risk management, legal discovery, and compliance?
Which factors MUST be considered when classifying information and supporting assets for risk management, legal discovery, and compliance?A . System owner roles and responsibilities, data handling standards, storage and secure development lifecycle requirementsB . Data stewardship roles, data handling and storage standards, data lifecycle requirementsC . Compliance office roles and...
Which of the following is a responsibility of a data steward?
Which of the following is a responsibility of a data steward?A . Ensure alignment of the data governance effort to the organization.B . Conduct data governance interviews with the organization.C . Document data governance requirements.D . Ensure that data decisions and impacts are communicated to the organization.View AnswerAnswer: A
How does Encapsulating Security Payload (ESP) in transport mode affect in the Internet Protocol (IP)?
How does Encapsulating Security Payload (ESP) in transport mode affect in the Internet Protocol (IP)?A . Authenticates the IP payload and selected portions of the IP headerB . Encrypts and optionally authenticates the complete IP packetC . Encrypts and optionally authenticates the IP header, but not the IP payloadD ....
Which of the following represents a valid measure to help protect the network against unauthorized access?
Within the company, desktop clients receive Internet Protocol (IP) address over Dynamic Host Configuration Protocol (DHCP). Which of the following represents a valid measure to help protect the network against unauthorized access?A . Implement path managementB . Implement port based security through 802.1xC . Implement DHCP to assign IP address...
Which of the following is part of a Trusted Platform Module (TPM)?
Which of the following is part of a Trusted Platform Module (TPM)?A . A non-volatile tamper-resistant storage for storing both data and signing keys in a secure fashionB . A protected Pre-Basic Input/Output System (BIOS) which specifies a method or a metric for “measuring” the state of a computing platformC...