⟩ ____________________ is the state of being correct, or the degree of certainty a person or process can have, that the data in an information asset is correct. A. Confidentiality B. Integrity C. Authenticity D. Privacy E. Availability?
B. Integrity
B. Integrity
Which of the following is NOT an auditing function that should be performed regularly? A. Reviewing IDS alerts B. Reviewing performance logs C. Reviewing IDS logs D. Reviewing audit logs E. Reviewing system logs?
Virtual corporations typically use a(n) _______ for maintaining centralized information assets. A. Off-line repository B. Floppy disk C. Data warehouse D. CD-ROM burner E. Colocation?
Which of the following is an example of a simple, physical-access control? A. Lock B. Access control list C. Background check D. Token E. Firewall?
A _______ attack uses multiple systems to launch a coordinated attack. A. Distributed denial-of-service B. Teardrop C. Birthday D. FTP Bounce E. Salami?
Explain Which encryption algorithm has the highest bit strength? A. AES B. Blowfish C. DES D. CAST E. Triple DES?
____________________ educate(s) security administrators and end users about organizations security policies. A. Security-awareness training B. Information Security (INFOSEC) briefings C. Acceptable-use policies D. Continuing education E. Nondisclosure agreements?
Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating system. A. Sequence Verifier B. Initial sequence number C. Address spoofing D. Time to Live E. IP ID field?
Embedding symbols in images or common items, such as pictures or quilts, is an example of __________. A. Espionage B. Transposition cipher C. Key exchange D. Arithmancy E. Steganography?
A(n) _______________ is an unintended communication path that can be used to violate a system security policy. A. Covert channel B. Integrity axiom C. Simple rule violation D. Inferred fact?
Organizations _______ risk, when they convince another entity to assume the risk for them. A. Elevate B. Assume C. Deny D. Transfer E. Mitigate?