⟩ I have informatica R and T dump with ans?
whoso ever it required pl. contact , pl. make a note it's a
paid service.
whoso ever it required pl. contact , pl. make a note it's a
paid service.
A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protect sensitive, but unclassified, information. What is the name of this Standard? A. Triple DES B. Blowfish C. AES D. CAST E. RSA
Explain Which of the following tests provides testing teams some information about hosts or networks? A. Partial-knowledge test B. Full-knowledge test C. Zero-knowledge test
(n) ________________ is a one-way mathematical function that maps variable values into smaller values of a fixed length. A. Symmetric key B. Algorithm C. Back door D. Hash function E. Integrity
_______ intrusion-detection systems learn the behavior of a machine or network, and create a baseline. A. Behavioral analysis B. Statistical anomaly C. Network D. Pattern matching E. Host
Explain Which principle of secure design states that a security mechanisms methods must be testable? A. Separation of privilege B. Least common mechanism C. Complete mediation D. Open design E. Economy of mechanism
Explain Which of the following should be included in an enterprise Business Continuity Plan (BCP)? (Choose THREE.) A. Accidental or intentional data deletion B. Severe weather disasters C. Employee terminations D. Employee administrative leave E. Minor power outages
Explain What type of document contains information on alternative business locations, IT resources, and personnel? A. End-user license agreement B. Nondisclosure agreement C. Acceptable use policy D. Security policy E. Business continuity plan?
A(n) _______ is the first step for determining which technical information assets should be protected. A. Network diagram B. Business Impact Analysis C. Office floor plan D. Firewall E. Intrusion detection system?
Explain Which type of Business Continuity Plan (BCP) test involves shutting down a primary site, bringing an alternate site on-line, and moving all operations to the alternate site? A. Parallel B. Full interruption C. Checklist D. Structured walkthrough E. Simulation?
_______ can mimic the symptoms of a denial-of-service attack, and the resulting loss in productivity can be no less devastating to an organization. A. ICMP traffic B. Peak traffic C. Fragmented packets D. Insufficient bandwidth E. Burst traffic?