单选题Which of the following was the first international treaty seeking to address computer crimes by coordinating national laws and improving investigative techniques and international cooperation?
单选题The following scenario applies to questions 28 and 29.Tim's development team is designing a new operating system. One of the requirements of the new product is that critical memory segments need to be categorized as nonexecutable, with the goal of reducing malicious code from being able to execute instructions in privileged mode. The team also wants to make sure that attackers will have a difficult time predicting execution target addresses.
单选题What markup language allows for the sharing of application security policies to ensure that all applications are following the same security rules?
单选题Therearedifferentwaysthatspecifictechnologiescancreateone-timepasswordsforauthenticationpurposes.Whattypeoftechnologyisillustratedinthegraphicthatfollows?
单选题Inaredundantarrayofinexpensivedisks(RAID)systems,dataandparityinformationarestripedoverseveraldifferentdisks.Whatisparityinformationusedfor?
单选题Thereareseveraldifferenttypesoftechnologieswithincryptographythatprovideconfidentiality.Whatisrepresentedinthegraphicthatfollows?
单选题As head of sales, Jim is the information owner for the sales department. Which of the following is not Jim's responsibility as information owner?
单选题Anaccesscontrolmatrixisusedinmanyoperatingsystemsandapplicationstocontrolaccessbetweensubjectsandobjects.Whatisthecolumninthistypeofmatrixreferredtoas?AccessControlMatrix
单选题What was the direct predecessor to Standard Generalized Markup Language(SGML)?
单选题Which of the following is not a common component of configuration management change control steps?
单选题The following scenario applies to questions 26 and 27.Charlie is a new security manager at a textile company that develops its own proprietary software for internal business processes. Charlie has been told that the new application his team needs to develop must comply with the ISO/IEC 42010 standard. He has found out that many of the critical applications have been developed in the C programming language and has asked for these applications to be reviewed for a specific class of security vulnerabilities.
单选题Which of the following attacks can be best prevented by limiting the amount of electrical signals emitted from a computer system?
单选题Therearedifferentwaysthatspecifictechnologiescancreateone-timepasswordsforauthenticationpurposes.Whattypeoftechnologyisillustratedinthegraphicthatfollows?
单选题Assigning data classification levels can help with all of the following except:
单选题Which of the following works similarly to stream ciphers?
单选题CPUs and operating systems can work in two main types of multitasking modes. What controls access and the use of system resources in preemptive multitasking mode?
单选题Which of the following is a correct statement regarding computer forensics?
单选题The trusted computing base (TCB) ensures security within a system when a process in one domain must access another domain in order to retrieve sensitive information. What function does the TCB initiate to ensure that this is done in a secure manner?
单选题SSL is a de facto protocol used for securing transactions that occur over untrusted networks. Which of the following best describes what takes place during an SSL connection setup process?
单选题Of the following plans, which establishes senior management and a headquarters after a disaster?
