⟩ Which default administrator group has delete permission?A. adminB. help-deskC. add-editD. full-control
D: full-control
D: full-control
Suppose A (n) __________________________ is issued by senior management, and defines an organizations security goals. A. Records-retention procedure B. Acceptable-use policy C. Organizational security policy D. Security policy mission statement E. Service level agreement?
Explain Which type of Business Continuity Plan (BCP) test involves practicing aspects of the BCP, without actually interrupting operations or bringing an alternate site on-line? A. Structured walkthrough B. Checklist C. Simulation D. Full interruption E. Parallel
Explain Which of the following can be stored on a workstation? (Choose TWO.) A. Payroll information B. Data objects used by many employees C. Databases D. Interoffice memo E. Customer correspondence
A(n) ______________________________ is a quantitative review of risks, to determine how an organization will continue to function, in the event a risk is realized. A. Monitored risk process B. Disaster-recovery plan C. Business impact analysis D. Full interruption test E. Information security audit
Explain Who should have physical access to network-connectivity devices and corporate servers? A. Customers and clients B. Accounting, information-technology, and auditing staff C. Managers and C-level executives D. Only appropriate information-technology personnel
_______ is a method of tricking users into revealing passwords, or other sensitive information. A. Dumpster diving B. Means testing C. Social engineering D. Risk E. Exposure
Explain Which of the following are enterprise administrative controls? (Choose TWO.) A. Network access control B. Facility access control C. Password authentication D. Background checks E. Employee handbooks
A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protect sensitive, but unclassified, information. What is the name of this Standard? A. Triple DES B. Blowfish C. AES D. CAST E. RSA
Explain Which of the following tests provides testing teams some information about hosts or networks? A. Partial-knowledge test B. Full-knowledge test C. Zero-knowledge test
(n) ________________ is a one-way mathematical function that maps variable values into smaller values of a fixed length. A. Symmetric key B. Algorithm C. Back door D. Hash function E. Integrity