Filters
Question type

Study Flashcards

List the four steps to developing a CM plan.

Correct Answer

verifed

verified

The four steps in developing t...

View Answer

The __________ vulnerability assessment is designed to find and document vulnerabilities that may be present in the organization's wireless local area networks.


A)  wireless
B)  phone-in 
C)  battle-dialing
D)  network

Correct Answer

verifed

verified

An effective information security governance program requires constant change. _________________________

Correct Answer

verifed

verified

When possible, major incident response plan elements should be rehearsed. _________________________

Correct Answer

verifed

verified

CERT stands for "computer emergency recovery team." _________________________

Correct Answer

verifed

verified

False

Proven cases of real vulnerabilities can be considered vulnerability ____________________.

Correct Answer

verifed

verified

__________ allows for major security control components to be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.


A)  System review
B)  Project review 
C)  Program review
D)  Application review

Correct Answer

verifed

verified

__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker) .


A)  Penetration testing
B)  Penetration simulation 
C)  Attack simulation
D)  Attack testing

Correct Answer

verifed

verified

An intranet vulnerability scan starts with the scan of the organization's default Internet search engine.

Correct Answer

verifed

verified

False

Digital ___________ is a crime against or using digital media, computer technology, or related components; in other words, a computer is the source of the crime or the object of it.

Correct Answer

verifed

verified

malfeasance

The __________ Web site and list site seclists.org is home to the leading free network exploration tool, Nmap.


A)  insecure.org
B)  Packet Storm 
C)  Security Focus
D)  Snort-sigs

Correct Answer

verifed

verified

The ____________________ vulnerability assessment is designed to find and document vulnerabilities that may be present in the organization's wireless local area networks.

Correct Answer

verifed

verified

In an online or __________ data acquisition, forensic investigators use network-based tools to acquire a protected copy of the information.

Correct Answer

verifed

verified

The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program. _________________________

Correct Answer

verifed

verified

__________ are a component of the security triple.


A)  Threats
B)  Assets 
C)  Vulnerabilities
D)  All of the above

Correct Answer

verifed

verified

A general guideline for performance of hard drives suggests that when the amount of data stored on a particular hard drive averages 95% of available capacity for a prolonged period, you should consider an upgrade for the drive.

Correct Answer

verifed

verified

An attacker's use of a laptop while driving around looking for open wireless connections is often called war ____________________.

Correct Answer

verifed

verified

Inventory characteristics for hardware and software assets that record the manufacturer and versions are related to technical functionality, and should be highly accurate and updated each time there is a change.

Correct Answer

verifed

verified

The __________ is a statement of the boundaries of the RA.


A)  scope
B)  disclaimer 
C)  footer
D)  head

Correct Answer

verifed

verified

In some instances, risk is acknowledged as being part of an organization's business process.

Correct Answer

verifed

verified

Showing 1 - 20 of 116

Related Exams

Show Answer