⟩ Explain Which of the following can be stored on a workstation? (Choose TWO.) A. Payroll information B. Data objects used by many employees C. Databases D. Interoffice memo E. Customer correspondence
D. Interoffice memo
E. Customer correspondence
D. Interoffice memo
E. Customer correspondence
Embedding symbols in images or common items, such as pictures or quilts, is an example of __________. A. Espionage B. Transposition cipher C. Key exchange D. Arithmancy E. Steganography?
A(n) _______________ is an unintended communication path that can be used to violate a system security policy. A. Covert channel B. Integrity axiom C. Simple rule violation D. Inferred fact?
Organizations _______ risk, when they convince another entity to assume the risk for them. A. Elevate B. Assume C. Deny D. Transfer E. Mitigate?
Explain Which browser-based configuration device can be used to monitor and manage multiple Cisco PIX Security Appliance? A. Cisco PIX Device Manager B. Cisco ASA Device Manager C. Firewall Management Center D. PIX Management Center
Explain Which of the following is not a group of COSO? a) Financial Executives International b) American Institute of Certified Public Accountants c) American Accounting Association d) Institute of Management Association e) The Institute of Internal Auditors
Explain Which is a type of Regression testing? a.Unit Regression testing b.Regional Regression Testing c.Full Regression Testing d.All the above
___________is designed to determine whether the software is fit for use. A.Usability testing B.Acceptance testing C.System testing D.Security testing
Explain which of the following protocols are example of tcp/ip network access layer protocols? 1. ethernet 2. http 3. ip 4. udp. 5. smtp 6. tcp 7. ppp?
Explain Which Cisco IOS command enables the AAA access-control commands and functions on the router, and overrides the older TACACS and extended TACACS commands? A. no aaa authentication login default enable B. aaa authentication login default local C. aaa new-model D. login authentication default E. no login authentication default
Explain Which command globally disables CDP? A. no dcp B. cdp disable C. no cdp enable D. no cdp run