⟩ Maintenance of the Business Continuity Plan (BCP) must be integrated with an organizations _______________ process. A. Change-control B. Disaster-recovery C. Inventory-maintenance D. Discretionary-budget E. Compensation-review?
A. Change-control
A. Change-control
Explain Which of the following is the BEST method for managing users in an enterprise? A. Enter user data in a spreadsheet. B. Implement centralized access control. C. Deploy Kerberos. D. Place them in a centralized Lightweight Directory Access Protocol. E. Use a Domain Name System.
Which of the following is NOT an auditing function that should be performed regularly? A. Reviewing IDS alerts B. Reviewing performance logs C. Reviewing IDS logs D. Reviewing audit logs E. Reviewing system logs?
Virtual corporations typically use a(n) _______ for maintaining centralized information assets. A. Off-line repository B. Floppy disk C. Data warehouse D. CD-ROM burner E. Colocation?
Which of the following is an example of a simple, physical-access control? A. Lock B. Access control list C. Background check D. Token E. Firewall?
A _______ attack uses multiple systems to launch a coordinated attack. A. Distributed denial-of-service B. Teardrop C. Birthday D. FTP Bounce E. Salami?
Explain Which encryption algorithm has the highest bit strength? A. AES B. Blowfish C. DES D. CAST E. Triple DES?
____________________ educate(s) security administrators and end users about organizations security policies. A. Security-awareness training B. Information Security (INFOSEC) briefings C. Acceptable-use policies D. Continuing education E. Nondisclosure agreements?
Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating system. A. Sequence Verifier B. Initial sequence number C. Address spoofing D. Time to Live E. IP ID field?
Embedding symbols in images or common items, such as pictures or quilts, is an example of __________. A. Espionage B. Transposition cipher C. Key exchange D. Arithmancy E. Steganography?
A(n) _______________ is an unintended communication path that can be used to violate a system security policy. A. Covert channel B. Integrity axiom C. Simple rule violation D. Inferred fact?