A) security coding
B) Privacy protection
C) data security system
D) data classification
Correct Answer
verified
Multiple Choice
A) Ping sweep
B) Nmap
C) Netcraft
D) Dig
Correct Answer
verified
Multiple Choice
A) Plain view doctrine
B) Corpus delicti
C) Locard Exchange Principle
D) Ex Parte Order
Correct Answer
verified
Multiple Choice
A) APIPA
B) IANA
C) CVE
D) RIPE
Correct Answer
verified
Multiple Choice
A) Lack of compliance to the Payment Card Industry (PCI) standards
B) Ineffective security awareness program
C) Lack of technical controls when dealing with credit card data
D) Security practices not in alignment with ISO 27000 frameworks
Correct Answer
verified
Multiple Choice
A) Rigorous syslog reviews
B) Intrusion Detection Systems (IDS)
C) Security Guards posted outside the Data Center
D) Data Loss Prevention (DLP)
Correct Answer
verified
Multiple Choice
A) How many credit records are stored?
B) What is the value of the assets at risk?
C) What is the scope of the certification?
D) How many servers do you have?
Correct Answer
verified
Multiple Choice
A) Relative likelihood of event
B) Controlled mitigation effort
C) Risk impact comparison
D) Comparative threat analysis
Correct Answer
verified
Multiple Choice
A) Vendor provided reference from an existing reputable client detailing their implementation
B) Vendor's client list of reputable organizations currently using their solution
C) Vendor provided internal risk assessment and security control documentation
D) Vendor provided attestation of the detailed security controls from a reputable accounting firm
Correct Answer
verified
Multiple Choice
A) Prior to signing the agreement and before any security services are being performed
B) Once the agreement has been signed and the security vendor states that they will need access to the network
C) Once the vendor is on premise and before they perform security services
D) At the time the security services are being performed and the vendor needs access to the network
Correct Answer
verified
Multiple Choice
A) Consumer right disclosure
B) Data breach disclosure
C) Special circumstance disclosure
D) Security incident disclosure
Correct Answer
verified
Multiple Choice
A) Real-time to remediate
B) Process improvements
C) Security budget augmentation
D) Security control selection
Correct Answer
verified
Multiple Choice
A) Information Security and Network teams perform two distinct functions
B) Information Security and Identity Access Management teams perform two distinct functions
C) Finance has access to Human Resources data
D) Developers and Network teams both have admin rights on servers
Correct Answer
verified
Multiple Choice
A) Directory listing of C: drive on the web server
B) Insert a Trojan horse into the C: drive of the web server
C) Execute a buffer flow in the C: drive of the web server
D) Directory listing of the C : \windows\system32 folder on the web server
Correct Answer
verified
Multiple Choice
A) Upper management support
B) More frequent project milestone meetings
C) Stakeholder support
D) None
E) Extend work hours
Correct Answer
verified
Multiple Choice
A) The NPV of the project is negative
B) The return on Investment (ROI) is larger than 10 months
C) The Net Present value (NPV) of the project is positive
D) The ROI is lower than 10 months
Correct Answer
verified
Multiple Choice
A) 70 years
B) the life of the author
C) the life of the author plus 70 years
D) copyrights last forever
Correct Answer
verified
Multiple Choice
A) Effective Security Vulnerability Management Program
B) Anti-malware tools
C) Effective Security awareness program
D) Anti-phishing tools
Correct Answer
verified
Multiple Choice
A) NTFS
B) FAT32
C) FAT16
D) FAT12
Correct Answer
verified
Multiple Choice
A) Withhold the vendor's payments until the issue is resolved.
B) refer to the contract agreement for direction.
C) Refer the vendor to the Service Level Agreement (SLA) and insist that they make the changes.
D) Review the Request for proposal (RFP) for guidance.
Correct Answer
verified
Showing 421 - 440 of 579
Related Exams