A) Risk Management
B) Risk Assessment
C) System Testing
D) Vulnerability Assessment
Correct Answer
verified
Multiple Choice
A) Scheduling
B) Back-out procedures
C) Outage planning
D) Management approval
Correct Answer
verified
Multiple Choice
A) Circuit-level proxy firewall
B) Packet filtering firewall
C) Application-level proxy firewall
D) Data link layer firewall
Correct Answer
verified
Multiple Choice
A) Partition the hard drive
B) Format the hard drive
C) Delete all files under the /dev/hda folder
D) Fill the disk with zeros
Correct Answer
verified
Multiple Choice
A) 3DES
B) AES
C) Blowfish
D) RC5
Correct Answer
verified
Multiple Choice
A) Develop a detailed internal organization chart
B) Develop a telephone call tree for emergency response
C) Develop an isolinear response matrix with cost benefit analysis projections
D) Develop a Responsible, Accountable, Consulted, Informed (RACI) chart
Correct Answer
verified
Multiple Choice
A) The data is still present until the original location of the file is used
B) The data is moved to the Restore directory and is kept there indefinitely
C) The data will reside in the L2 cache on a Windows computer until it is manually deleted
D) It is not possible to recover data that has been emptied from the Recycle Bin
Correct Answer
verified
Multiple Choice
A) It contains the times and dates of when the system was last patched
B) It is not necessary to scan the virtual memory of a computer
C) It contains the times and dates of all the system files
D) Hidden running processes
Correct Answer
verified
Multiple Choice
A) After the evidence examination has been completed
B) On an hourly basis during the evidence examination
C) Before and after evidence examination
D) Before the evidence examination has been completed
Correct Answer
verified
Multiple Choice
A) Define the risk appetite
B) Determine budget constraints
C) Review project charters
D) Collaborate security projects
Correct Answer
verified
Multiple Choice
A) Vendors uses their own laptop and logins with same admin credentials your security team uses
B) Vendor uses a company supplied laptop and logins using two factor authentication with same admin credentials your security team uses
C) Vendor uses a company supplied laptop and logins using two factor authentication with their own unique credentials
D) Vendor uses their own laptop and logins using two factor authentication with their own unique credentials
Correct Answer
verified
Showing 121 - 131 of 131
Related Exams