Filters
Question type

Remediation of vulnerabilities can be accomplished by accepting or transferring the risk, removing the threat, or repairing the vulnerability.

Correct Answer

verifed

verified

An effective information security governance program requires no ongoing review once it is well established.

Correct Answer

verifed

verified

To evaluate the performance of a security system, administrators must establish system performance __________.


A) baselines
B) profiles
C) maxima
D) means

Correct Answer

verifed

verified

For configuration management (CM) and control, it is important to document the proposed or actual changes in the system security plan. _________________________

Correct Answer

verifed

verified

True

A(n) ____________________ analysis is a procedure that compares the current state of a network segment (the systems and services it offers) against a known previous state of that same network segment (the baseline of systems and services).

Correct Answer

verifed

verified

Tracking compliance involves assessing the status of the program as indicated by the database information and mapping it to goals established by the agency. _________________________

Correct Answer

verifed

verified

The primary goal of the vulnerability assessment and ____________________ domain is to identify specific, documented vulnerabilities and remediate them in a timely fashion.

Correct Answer

verifed

verified

Why should agencies monitor the status of their programs?

Correct Answer

verifed

verified

Agencies should monitor the status of th...

View Answer

The simplest part of an investigation is analyzing a copy or image for potential evidentiary material. __________

Correct Answer

verifed

verified

__________ is used to respond to network change requests and network architectural design proposals.


A) Network connectivity RA
B) Dialed modem RA
C) Application RA
D) Vulnerability RA

Correct Answer

verifed

verified

Each organization sets policy to choose one of two approaches when employing digital forensics. Select the statement that best identifies the options.


A) Protect and forget
B) Apprehend and prosecute
C) Neither of these is an approach to be chosen
D) Both of these are approaches that might be chosen

Correct Answer

verifed

verified

US-CERT is a set of moderated mailing lists full of detailed, full-disclosure discussions and announcements about computer security vulnerabilities. It is sponsored in part by SecurityFocus. _________________________

Correct Answer

verifed

verified

In an online or __________ data acquisition, forensic investigators use network-based tools to acquire a protected copy of the information.

Correct Answer

verifed

verified

Threats cannot be removed without requiring a repair of the vulnerability.

Correct Answer

verifed

verified

False

The internal monitoring domain is the component of the maintenance model that focuses on identifying, assessing, and managing the physical security of assets in an organization.

Correct Answer

verifed

verified

False

A management model such as ISO 27000 deals with methods to maintain systems.

Correct Answer

verifed

verified

Over time, external monitoring processes should capture information about the external environment in a format that can be referenced across the organization as threats emerge and for historical use.

Correct Answer

verifed

verified

CERT stands for "computer emergency recovery team." _________________________

Correct Answer

verifed

verified

Specific routine bulletins are issued when developing threats and specific attacks pose a measurable risk to the organization. _________________________

Correct Answer

verifed

verified

__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker) .


A) Penetration testing
B) Penetration simulation
C) Attack simulation
D) Attack testing

Correct Answer

verifed

verified

Showing 1 - 20 of 116

Related Exams

Show Answer