单选题John has been told to report to the board of directors with a vendor-neutral enterprise architecture framework that will help the company reduce fragmentation that results from the misalignment of IT and business processes. Which of the following frameworks should he suggest?
单选题Which of the following is a critical first step in disaster recovery and contingency planning?
单选题Operating systems can be programmed to carry out different methods for process isolation. Which of the following refers to a method in which an interface defines how communication can take place between two processes and no process can interact with the other"s internal programming code?
单选题Robert is responsible for implementing a common architecture used when customers need to access confidential information through Internet connections. Which of the following best describes this type of architecture?
单选题Differentaccesscontrolmodelsprovidespecifictypesofsecuritymeasuresandfunctionalityinapplicationsandoperatingsystems.Whatmodelisbeingexpressedinthegraphicthatfollows?
单选题Therearefivedifferentclassesoffire.Eachdependsuponwhatisonfire.Whichofthefollowingisthepropermappingfortheitemsmissingintheprovidedtable?
单选题What role does the Internet Architecture Board play regarding technology and ethics?
单选题There are common cloud computing service models. ______ usually requires companies to deploy their own operating systems, applications, and software onto the provided infrastructure, ______ is the software environment that runs on top of the infrastructure. In the ______ model the provider commonly gives the customers network-based access to a single copy of an application.
单选题There are common cloud computing service models.______ usually requires companies to deploy their own operating systems, applications, and software onto the provided infrastructure.______is the software environment that runs on top of the infrastructure. In the ______model the provider commonly gives the customers network-based access to a single copy of an application.
单选题The CA is responsible for revoking certificates when necessary. Which of the following correctly describes a CRL and OSCP?
单选题Thereareseveralsecurityenforcementcomponentsthatarecommonlybuiltintooperatingsystems.Whichcomponentisillustratedinthegraphicthatfollows?
单选题Which of the following correctly describes the relationship between the reference monitor and the security kernel?
单选题John and his team are conducting a penetration test of a client's network. The team will conduct its testing armed only with knowledge it acquired from the Web. The network staff is aware that the testing will take place, but the penetration testing team will only work with publicly available data and some information from the client. What is the degree of the team's knowledge and what type of test is the team carrying out?
单选题______provides for availability and scalability. It groups physically different systems and combines them logically, which helps to provide immunity to faults and improves performance.
单选题In cryptography, different steps and algorithms provide different types of security services. Which of the following provides only authentication, nonrepudiation, and integrity?
单选题There are three different types of incident response teams. Which of the following correctly describes a virtual team?
单选题Tanya is the security administrator for a large distributed retail company. The company's network has many different network devices and software appliances that generate logs and audit data. Tanya and her staff have become overwhelmed with trying to review all of the log files when attempting to identify if anything suspicious is taking place within the network. Which of the following is the best solution for this company to implement?
单选题WhatdotheSAvaluesinthegraphicofIPSecthatfollowsrepresent?
单选题The following scenario applies to questions 27 and 28.Sam is the security manager of a company that makes most of its revenue from its intellectual property. Sam has implemented a process improvement program that has been certified by an outside entity. His company received a Level 2 during an appraisal process, and he is putting in steps to increase this to a Level 3. A year ago when Sam carried out a risk analysis, he determined that the company was at too much of a risk when it came to potentially losing trade secrets. The countermeasure his team implemented reduced this risk, and Sam determined that the annualized loss expectancy of the risk of a trade secret being stolen once in a hundred-year period is now $400.
单选题Thereareseveraltypesofattacksthatprogrammersneedtobeawareof.Whatattackdoesthegraphicthatfollowsillustrate?