PrepAway - Latest Free Exam Questions & Answers

Category: 642-566 (v.1)

Exam 642-566: Security Solutions for Systems Engineers (update November 10th, 2015)

Which primary security design components should be addressed while performing EnterpriseInternet Access protec

Which primary security design components should be addressed while performing
EnterpriseInternet Access protection?(Not all design components are required.)
1. resource separation
2. network infrastructure device hardening
3. network signaling protection
4. boundary access control
5. compliance assessment
6. endpoint protection

Which option is correct about the relationship between the malware type and its description?

Which option is correct about the relationship between the malware type and its description?
1. virus
2. worms
3. botnets
4. spyware
5. Trojan horses
6. rootkits
a. collection of compromised computers under a common command-and-control infrastructure
b. typically used to monitor user actions
c. autonomously spreads to other systems without user interaction

d. malware that hides through evasion of the operating system security mechanisms
e. requires some user action to infect the system
f. malware that hides inside anoter legitimate looking application

Which item is correct about the relationship between the security risk management related term and its proper

Which item is correct about the relationship between the security risk management related term
and its proper definition?
1.asset
2.threat
3.vulnerability
4.risk
a. anything that has value to an organization
b. A weakness in a system or its design that could be exploited
c. The likelihood of a particular attack occurring and resulting in an undesirable consequence
d. Any circumstance or event with the potential to cause harm to an information system


Page 16 of 17« First...10...1314151617