单选题The following scenario applies to questions 29, 30, and 31.Barry has just been hired as the company security officer at an international financial institution. He has reviewed the company's data protection policies and procedures. He sees that the company stores its sensitive data within a secured database. The database is located in a network segment all by itself, which is monitored by a network-based intrusion detection system. The database is hosted on a server kept within a server room, which can only be accessed by personnel with the correct PIN value and smart card. Barry finds that the sensitive data backups are not being properly secured and requests that the company implement a secure courier service that moves backup tapes to a secured location. His management states that this option is too expensive, so Barry implements a local hierarchy storage management system that properly protects the sensitive data.
单选题Brad is installing windows on the storefront of a bank in an area known to be at risk of fires in the dry season. Which of the following is least likely to be true of the windows he is installing?
单选题Advanced Encryption Standard is an algorithm used for which of the following?
单选题Encryption can happen at different layers of an operating system and network stack, where does PPTP encryption take place?
单选题Which of the following is the best way to reduce brute-force attacks that allow intruders to uncover users' passwords?
单选题Which of the following steps comes first in a business impact analysis?
单选题Thefollowinggraphiccontainsacommonlyusedriskmanagementscorecard.Identifytheproperquadrantanditsdescription.
单选题Jared plays a role in his company"s data classification system. In this role, he must practice due care when accessing data and ensure that the data is used only in accordance with allowed policy while abiding by the rules set for the classification of the data. He does not determine, maintain, or evaluate controls, so what is Jared"s role?
单选题Several types of read-only memory devices can be modified after they are manufactured. Which of the following statements correctly describes the differences between two types of ROM?
单选题John has been told to report to the board of directors with a vendor-neutral enterprise architecture framework that will help the company reduce fragmentation that results from the misalignment of IT and business processes. Which of the following frameworks should he suggest?
单选题Which of the following is a critical first step in disaster recovery and contingency planning?
单选题Operating systems can be programmed to carry out different methods for process isolation. Which of the following refers to a method in which an interface defines how communication can take place between two processes and no process can interact with the other"s internal programming code?
单选题Robert is responsible for implementing a common architecture used when customers need to access confidential information through Internet connections. Which of the following best describes this type of architecture?
单选题Differentaccesscontrolmodelsprovidespecifictypesofsecuritymeasuresandfunctionalityinapplicationsandoperatingsystems.Whatmodelisbeingexpressedinthegraphicthatfollows?
单选题Therearefivedifferentclassesoffire.Eachdependsuponwhatisonfire.Whichofthefollowingisthepropermappingfortheitemsmissingintheprovidedtable?
单选题What role does the Internet Architecture Board play regarding technology and ethics?
单选题There are common cloud computing service models. ______ usually requires companies to deploy their own operating systems, applications, and software onto the provided infrastructure, ______ is the software environment that runs on top of the infrastructure. In the ______ model the provider commonly gives the customers network-based access to a single copy of an application.
单选题There are common cloud computing service models.______ usually requires companies to deploy their own operating systems, applications, and software onto the provided infrastructure.______is the software environment that runs on top of the infrastructure. In the ______model the provider commonly gives the customers network-based access to a single copy of an application.
单选题The CA is responsible for revoking certificates when necessary. Which of the following correctly describes a CRL and OSCP?
单选题Thereareseveralsecurityenforcementcomponentsthatarecommonlybuiltintooperatingsystems.Whichcomponentisillustratedinthegraphicthatfollows?
