单选题The following scenario is to be used for questions 27, 28, and 29.Mike is the new CSO of a large pharmaceutical company. He has been asked to revamp the company's physical security program and better align it with the company's information security practices. Mike knows that the new physical security program should be made up of controls and processes that support the following categories: deterrent, delaying, detection, assessment, and response.
单选题Which of the following antivirus detection methods is the most recent to the industry and monitors suspicious code as it executes within the operating system?
单选题Operating systems have evolved and changed over the years. The earlier operating systems were monolithic and did not segregate critical processes from noncritical processes. As time went on operating system vendors started to reduce the amount of programming code that ran in kernel mode. Only the absolutely necessary code ran in kernel mode, and the remaining operating system code ran in user mode. This architecture introduced performance issues, which required the operating system vendors to reduce the critical operating system functionality to microkernels and allow the remaining operating system functionality to run in client/server models within kernel mode.
单选题Anaccesscontrolmatrixisusedinmanyoperatingsystemsandapplicationstocontrolaccessbetweensubjectsandobjects.Whatisthecolumninthistypeofmatrixreferredtoas?
单选题Sue has been tasked with implementing a number of security controls, including antivirus and antispam software, to protect the company"s e-mail system, What type of approach is her company taking to handle the risk posed by the system?
单选题Susan, an attorney, has been hired to fill a new position at Widgets Inc. The position is Chief Privacy Officer (CPO). What is the primary function of her new role?
单选题Whattechnologywithinidentitymanagementisillustratedinthegraphicthatfollows?
单选题John is installing a sprinkler system that makes use of a thermal-fusible link for a data center located in Canada. Which of the following statements is true of the system he's installing?
单选题ACME Inc. paid a software vendor to develop specialized software, and that vendor has gone out of business. ACME Inc. does not have access to the code and therefore cannot keep it updated. What mechanism should the company have implemented to prevent this from happening?
单选题If Marge uses her private key to create a digital signature on a message she is sending to George, but she does not show or share her private key with George, what is it an example of?
单选题Hanna is a new security manager for a computer consulting company. She has found out that the company has lost intellectual property in the past because malicious employees installed rogue devices on the network, which were used to capture sensitive traffic. Hanna needs to implement a solution that ensures only authorized devices are allowed access to the company network. Which of the following IEEE standards was developed for this type of protection?
单选题Sam plans to establish mobile phone service using the personal information he has stolen from his former boss. What type of identity theft is this?
单选题Thereareseveraldifferentmodesthatblockcipherscanworkin.Whichmodedoesthegraphicthatfollowsportray?
单选题As his company's CISO, George needs to demonstrate to the Board of Directors the necessity of a strong risk management program. Which of the following should George use to calculate the company's residual risk?
单选题Which of the following is not considered a countermeasure to port scanning and operating system fingerprinting?
单选题There are several categories of evidence. How is a witness's oral testimony categorized?
单选题Hannah has been assigned the task of installing Web access management (WAM) software. What is the best description for what WAM is commonly used for?
单选题Which of the following does not describe privacy-aware role-based access control?
单选题Which of the following is considered the second generation of programming languages?
单选题Before an effective physical security program can be rolled out, a number of steps must be taken. Which of the following steps comes first in the process of rolling out a security program?
