Filters
Question type

Study Flashcards

Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?


A) Risk Management
B) Risk Assessment
C) System Testing
D) Vulnerability Assessment

Correct Answer

verifed

verified

Which of the following is the MOST important component of any change management process?


A) Scheduling
B) Back-out procedures
C) Outage planning
D) Management approval

Correct Answer

verifed

verified

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold? needs?


A) Circuit-level proxy firewall
B) Packet filtering firewall
C) Application-level proxy firewall
D) Data link layer firewall

Correct Answer

verifed

verified

What will the following command accomplish in Linux? fdisk /dev/hda


A) Partition the hard drive
B) Format the hard drive
C) Delete all files under the /dev/hda folder
D) Fill the disk with zeros

Correct Answer

verifed

verified

What encryption technology is used on Blackberry devices Password Keeper?


A) 3DES
B) AES
C) Blowfish
D) RC5

Correct Answer

verifed

verified

A recommended method to document the respective roles of groups and individuals for a given process is to:


A) Develop a detailed internal organization chart
B) Develop a telephone call tree for emergency response
C) Develop an isolinear response matrix with cost benefit analysis projections
D) Develop a Responsible, Accountable, Consulted, Informed (RACI) chart

Correct Answer

verifed

verified

Why is it still possible to recover files that have been emptied from the Recycle Bin on a Windows computer?


A) The data is still present until the original location of the file is used
B) The data is moved to the Restore directory and is kept there indefinitely
C) The data will reside in the L2 cache on a Windows computer until it is manually deleted
D) It is not possible to recover data that has been emptied from the Recycle Bin

Correct Answer

verifed

verified

John is working as a computer forensics investigator for a consulting firm in Canada. He is called to seize a computer at a local web caf purportedly used as a botnet server. John thoroughly scans the computer and finds nothing that would lead him to think the computer was a botnet server. John decides to scan the virtual memory of the computer to possibly find something he had missed. What information will the virtual memory scan produce?


A) It contains the times and dates of when the system was last patched
B) It is not necessary to scan the virtual memory of a computer
C) It contains the times and dates of all the system files
D) Hidden running processes

Correct Answer

verifed

verified

When should an MD5 hash check be performed when processing evidence?


A) After the evidence examination has been completed
B) On an hourly basis during the evidence examination
C) Before and after evidence examination
D) Before the evidence examination has been completed

Correct Answer

verifed

verified

Which of the following is MOST beneficial in determining an appropriate balance between uncontrolled innovation and excessive caution in an organization?


A) Define the risk appetite
B) Determine budget constraints
C) Review project charters
D) Collaborate security projects

Correct Answer

verifed

verified

When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?


A) Vendors uses their own laptop and logins with same admin credentials your security team uses
B) Vendor uses a company supplied laptop and logins using two factor authentication with same admin credentials your security team uses
C) Vendor uses a company supplied laptop and logins using two factor authentication with their own unique credentials
D) Vendor uses their own laptop and logins using two factor authentication with their own unique credentials

Correct Answer

verifed

verified

Showing 121 - 131 of 131

Related Exams

Show Answer