⟩ Explain CASQ certification pprs?
planning to give CASQ certification early next year, if some1 has given same, plz let me how to prepare for it. Also if any1 has sample pprs/ prev yr pprs for CASQ, plz mail me at kanisha1906@gmail.com
thnx
planning to give CASQ certification early next year, if some1 has given same, plz let me how to prepare for it. Also if any1 has sample pprs/ prev yr pprs for CASQ, plz mail me at kanisha1906@gmail.com
thnx
Explain Which of the following can be stored on a workstation? (Choose TWO.) A. Payroll information B. Data objects used by many employees C. Databases D. Interoffice memo E. Customer correspondence
A(n) ______________________________ is a quantitative review of risks, to determine how an organization will continue to function, in the event a risk is realized. A. Monitored risk process B. Disaster-recovery plan C. Business impact analysis D. Full interruption test E. Information security audit
Explain Who should have physical access to network-connectivity devices and corporate servers? A. Customers and clients B. Accounting, information-technology, and auditing staff C. Managers and C-level executives D. Only appropriate information-technology personnel
_______ is a method of tricking users into revealing passwords, or other sensitive information. A. Dumpster diving B. Means testing C. Social engineering D. Risk E. Exposure
Explain Which of the following are enterprise administrative controls? (Choose TWO.) A. Network access control B. Facility access control C. Password authentication D. Background checks E. Employee handbooks
A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protect sensitive, but unclassified, information. What is the name of this Standard? A. Triple DES B. Blowfish C. AES D. CAST E. RSA
Explain Which of the following tests provides testing teams some information about hosts or networks? A. Partial-knowledge test B. Full-knowledge test C. Zero-knowledge test
(n) ________________ is a one-way mathematical function that maps variable values into smaller values of a fixed length. A. Symmetric key B. Algorithm C. Back door D. Hash function E. Integrity
_______ intrusion-detection systems learn the behavior of a machine or network, and create a baseline. A. Behavioral analysis B. Statistical anomaly C. Network D. Pattern matching E. Host
Explain Which principle of secure design states that a security mechanisms methods must be testable? A. Separation of privilege B. Least common mechanism C. Complete mediation D. Open design E. Economy of mechanism