单选题CGTV can use fixed focal length or varifocal lenses. Which of the following correctly describes the lenses used in CCTV?
单选题A suspected crime has been reported within your organization. Which of the following steps should the incident response team take first?
单选题Of the following steps that describe the development of a botnet, which best describes the step that comes first?
单选题Michael is charged with developing a classification program for his company. Which of the following should he do first?
单选题During what stage of incident response is it determined if the source of the incident was internal or external, and how the offender penetrated and gained access to the asset?
单选题What cryptographic attack type carries out a mathematical analysis by trying to break a math problem from the beginning and the end of the mathematical formula simultaneously?
单选题A number of factors should be considered when assigning values to assets. Which of the following is not used to determine the value of an asset?
单选题Steve, a department manager, has been asked to join a committee that is responsible for defining an acceptable level of risk for the organization, reviewing risk assessment and audit reports, and approving significant changes to security policies and programs. What committee is he joining?
单选题End-to-end encryption is used by users, and link encryption is used by service providers. Which of the following correctly describes these technologies?
单选题Encryption can happen at different layers of an operating system and network stack. Where does PPTP encryption take place?
单选题Harrison is evaluating access control products for his company. Which of the following is not a factor he needs to consider when choosing the products?
单选题Brad is a security manager at Thingamabobs Inc. He is preparing a presentation for his company"s executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation?
单选题Thereareseveraltypesofredundanttechnologiesthatcanbeputintoplace.Whattypeoftechnologyisshowninthegraphicthatfollows?
单选题Thereareseveraldifferenttypesofimportantarchitectureswithinpublickeyinfrastructures.Whicharchitecturedoesthegraphicthatfollowsrepresent?
单选题Business continuity plans can be assessed via a number of tests. Which type of test continues up to the point of actual relocation to an offsite facility and actual shipment of replacement equipment?
单选题ThereareseveraldifferentimportantpiecestotheCommonCriteria.Whichofthefollowingbestdescribesthefirstofthemissingcomponents?
单选题When an organization is unsure of the final nature of the product, what type of system development method is most appropriate for them?
单选题Various levels of RAID dictate the type of activity that will take place within the RAID system. Which level is associated with byte-level parity?
单选题A rule-based IDS takes a different approach than a signature-based or anomaly based system. Which of the following is characteristic of a rule-based IDS?
单选题Which of the following does not correctly describe a directory service?
