Which of the following are natural environmental threats that an organization faces?
Which of the following are natural environmental threats that an organization faces? Each correct
answer represents a complete solution. Choose two.
Which of the following keys are included in a certificate revocation list (CRL) of a public key infrastructure
Which of the following keys are included in a certificate revocation list (CRL) of a public key
infrastructure (PKI)? Each correct answer represents a complete solution. Choose two.
Which of the following SDLC phases consists of the given security controls…
Which of the following SDLC phases consists of the given security controls: Misuse Case
Modeling Security Design and Architecture Review Threat and Risk Modeling Security
Requirements and Test Cases Generation
Which of the following authentication methods will you suggest?
A company named Money Builders Inc., hires you to provide consultancy for setting up their
Windows network. The company’s server room will be in a highly secured environment. You are
required to suggest an authentication method for it. The CFO of the company wants the server to
use thumb impressions for authentication. Which of the following authentication methods will you
suggest?
Which algorithm are they most likely using for hashing?
You are the Security Consultant and have been contacted by a client regarding their encryption
and hashing algorithms. Their in-house network administrator tells you that their current hashing
algorithm is an older one with known weaknesses and is not collision resistant.Which algorithm
are they most likely using for hashing?
Which of the following types of firewalls will you configure to accomplish the task?
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based
network. You need to configure a firewall for the company. The firewall should be able to keep
track of the state of network connections traveling across the network. Which of the following types
of firewalls will you configure to accomplish the task?
Which of the following is violated in a shoulder surfing attack?
Shoulder surfing is a type of in-person attack in which the attacker gathers information about the
premises of an organization. This attack is often performed by looking surreptitiously at the
keyboard of an employee’s computer while he is typing in his password at any access point such
as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?
Which of the following plans is designed to protect critical business processes from natural or man-made failu
Which of the following plans is designed to protect critical business processes from natural or
man-made failures or disasters and the resultant loss of capital due to the unavailability of normal
business processes?
Which of the following processes is used by remote users to make a secure connection to internal resources aft
Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
Which of the following documents will be useful for you as well as public relations personnel…?
You work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in
the DRP efforts. You have maintained several different types of plan documents, intended for
different audiences. Which of the following documents will be useful for you as well as public
relations personnel who require a non-technical perspective on the entire organization’s disaster
recovery efforts?