单选题Virtual storage combines RAM and secondary storage for system memory. Which of the following is a security concern pertaining to virtual storage?
单选题Therearefourwaysofdealingwithrisk.Inthegraphicthatfollows,whichmethodismissingandwhatisthepurposeofthismethod?
单选题DNS is a popular target for attackers due to its strategic role on the Internet. What type of attack uses recursive queries to poison the cache of a DNS server?
单选题Which of the following correctly describes Bluejacking?
单选题Which of the following occurs in a PKI environment?
单选题An elliptic curve cryptosystem is an asymmetric algorithm. What sets it apart from other asymmetric algorithms?
单选题Thereareseveraldifferenttypesofimportantarchitectureswithinbackuptechnologies.Whicharchitecturedoesthegraphicthatfollowsrepresent?
单选题Which security architecture model defines how to securely develop access rights between subjects and objects?
单选题Protection profiles used in the Common Criteria evaluation process contain five elements. Which of the following establishes the type and intensity of the evaluation?
单选题Security countermeasures should be transparent to users and attackers. Which of the following does not describe transparency?
单选题Listintheproperorderfromthetableonthetopofthenextpagethelearningobjectivesthataremissingandtheirproperdefinitions.
单选题Of the following, what is the primary item that a capability listing is based upon?
单选题Which of the following best describes the difference between a virtual firewall that works in bridge mode versus one that is embedded into a hypervisor?
单选题Sarah recently learned that the painting she inherited from a relative and hung in her downtown coffee shop is worth a lot of money. She is worried about its protection and wants to install an IDS. Which of the following intrusion detection systems is the most appropriate for protecting the painting?
单选题Brian, a security administrator, is responding to a virus infection. The antivirus application reports that a file has been infected with a dangerous virus and disinfecting it could damage the file. What course of action should Brian take?
单选题Which of the following incorrectly describes how routing commonly takes place on the Internet?
单选题For evidence to be legally admissible, it must be authentic, complete, sufficient, and reliable. Which characteristic refers to the evidence having a reasonable and sensible relationship to the findings?
单选题Sally has found out that software programmers in her company are making changes to software components and uploading them to the main software repository without following version control or documenting their changes. This is causing a lot of confusion and has caused several teams to use the older versions. Which of the following would be the best solution for this situation?
单选题A number of attacks can be performed against smart cards. Side-channel is a class of attacks that doesn"t try to compromise a flaw or weakness. Which of the following is not a side-channel attack?
单选题Which of the following correctly describes a federated identity and its role within identity management processes?
