单选题Several types of read-only memory devices can be modified after they are manufactured. Which of the following statements correctly describes the differences between two types of ROM?
单选题Which of the following steps comes first in a business impact analysis?
单选题John has been told to report to the board of directors with a vendor-neutral enterprise architecture framework that will help the company reduce fragmentation that results from the misalignment of IT and business processes. Which of the following frameworks should he suggest?
单选题Which of the following is a critical first step in disaster recovery and contingency planning?
单选题Jared plays a role in his company"s data classification system. In this role, he must practice due care when accessing data and ensure that the data is used only in accordance with allowed policy while abiding by the rules set for the classification of the data. He does not determine, maintain, or evaluate controls, so what is Jared"s role?
单选题The CA is responsible for revoking certificates when necessary. Which of the following correctly describes a CRL and OSCP?
单选题Operating systems can be programmed to carry out different methods for process isolation. Which of the following refers to a method in which an interface defines how communication can take place between two processes and no process can interact with the other"s internal programming code?
单选题Differentaccesscontrolmodelsprovidespecifictypesofsecuritymeasuresandfunctionalityinapplicationsandoperatingsystems.Whatmodelisbeingexpressedinthegraphicthatfollows?
单选题Thereareseveralsecurityenforcementcomponentsthatarecommonlybuiltintooperatingsystems.Whichcomponentisillustratedinthegraphicthatfollows?
单选题What role does the Internet Architecture Board play regarding technology and ethics?
单选题Robert is responsible for implementing a common architecture used when customers need to access confidential information through Internet connections. Which of the following best describes this type of architecture?
单选题There are common cloud computing service models. ______ usually requires companies to deploy their own operating systems, applications, and software onto the provided infrastructure, ______ is the software environment that runs on top of the infrastructure. In the ______ model the provider commonly gives the customers network-based access to a single copy of an application.
单选题Thefollowinggraphiccontainsacommonlyusedriskmanagementscorecard.Identifytheproperquadrantanditsdescription.
单选题Which of the following correctly describes the relationship between the reference monitor and the security kernel?
单选题Therearefivedifferentclassesoffire.Eachdependsuponwhatisonfire.Whichofthefollowingisthepropermappingfortheitemsmissingintheprovidedtable?
单选题There are common cloud computing service models.______ usually requires companies to deploy their own operating systems, applications, and software onto the provided infrastructure.______is the software environment that runs on top of the infrastructure. In the ______model the provider commonly gives the customers network-based access to a single copy of an application.
单选题In cryptography, different steps and algorithms provide different types of security services. Which of the following provides only authentication, nonrepudiation, and integrity?
单选题John and his team are conducting a penetration test of a client's network. The team will conduct its testing armed only with knowledge it acquired from the Web. The network staff is aware that the testing will take place, but the penetration testing team will only work with publicly available data and some information from the client. What is the degree of the team's knowledge and what type of test is the team carrying out?
单选题There are three different types of incident response teams. Which of the following correctly describes a virtual team?
单选题______provides for availability and scalability. It groups physically different systems and combines them logically, which helps to provide immunity to faults and improves performance.
