单选题Michael is charged with developing a classification program for his company. Which of the following should he do first?
单选题Encryption can happen at different layers of an operating system and network stack. Where does PPTP encryption take place?
单选题Harrison is evaluating access control products for his company. Which of the following is not a factor he needs to consider when choosing the products?
单选题Thereareseveraltypesofredundanttechnologiesthatcanbeputintoplace.Whattypeoftechnologyisshowninthegraphicthatfollows?
单选题CGTV can use fixed focal length or varifocal lenses. Which of the following correctly describes the lenses used in CCTV?
单选题Steve, a department manager, has been asked to join a committee that is responsible for defining an acceptable level of risk for the organization, reviewing risk assessment and audit reports, and approving significant changes to security policies and programs. What committee is he joining?
单选题Thereareseveraldifferenttypesofimportantarchitectureswithinpublickeyinfrastructures.Whicharchitecturedoesthegraphicthatfollowsrepresent?
单选题Various levels of RAID dictate the type of activity that will take place within the RAID system. Which level is associated with byte-level parity?
单选题Brad is a security manager at Thingamabobs Inc. He is preparing a presentation for his company"s executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation?
单选题A rule-based IDS takes a different approach than a signature-based or anomaly based system. Which of the following is characteristic of a rule-based IDS?
单选题When an organization is unsure of the final nature of the product, what type of system development method is most appropriate for them?
单选题Which of the following does not correctly describe a directory service?
单选题Which of the following is a light-sensitive chip used in most of today's CCTV cameras?
单选题Which of the following correctly describes a drawback of symmetric key systems?
单选题Which of the following describes the type of construction materials most commonly used to build a bank's exterior walls?
单选题During an incident response, what stage involves mitigating the damage caused by an incident?
单选题Which of the following correctly describes the difference between public key cryptography and public key infrastructure?
单选题ISO/IEC 27000 is part of a growing family of ISO/IEC information security management systems (ISMS) standards. It comprises information security standards published jointly by the International Organization for Standardization (ISO) and the International Electro-technical Commission (IEC). Which of the following provides an incorrect mapping of the individual standards that make up this family of standards?
单选题Which of the following does not describe IP telephony security?
单选题WhichtypeofWANtunnelingprotocolismissingfromthetablethatfollows?
