Which of the following describes the portion of the hard disk that a computer borrows to use as memory?
Which of the following describes the portion of the hard disk that a computer borrows to use as memory?
Which of the following should the director require from the developers before agreeing to deploy the system?
A newly-appointed risk management director for the IT department at Company XYZ, a major
pharmaceutical manufacturer, needs to conduct a risk analysis regarding a new system which the
developers plan to bring on-line in three weeks. The director begins by reviewing the thorough and
well-written report from the independent contractor who performed a security assessment of the
system. The report details what seem to be a manageable volume of infrequently exploited
security vulnerabilities. The director decides to implement continuous monitoring and other
security controls to mitigate the impact of the vulnerabilities. Which of the following should the
director require from the developers before agreeing to deploy the system?
which of the following is the MOST significant risk to the system?
Company XYZ has transferred all of the corporate servers, including web servers, to a cloud
hosting provider to reduce costs. All of the servers are running unpatched, outdated versions of
Apache. Furthermore, the corporate financial data is also hosted by the cloud services provider,
but it is encrypted when not in use. Only the DNS server is configured to audit user and
administrator actions and logging is disabled on the other virtual machines. Given this scenario,
which of the following is the MOST significant risk to the system?
Which of the following devices is called the brain of a computer?
Which of the following devices is called the brain of a computer?
Which of the following actions can the CISO take to mitigate the breaches?
A Chief Information Security Officer (CISO) of a major consulting firm has significantly increased
the company’s security posture; however, the company is still plagued by data breaches of
misplaced assets. These data breaches as a result have led to the compromise of sensitive
corporate and client data on at least 25 occasions. Each employee in the company is provided a
laptop to perform company business. Which of the following actions can the CISO take to mitigate
the breaches?
Which of the following BEST describes how to adapt to the threat?
The security administrator is responsible for the confidentiality of all corporate data. The
company’s servers are located in a datacenter run by a different vendor. The vendor datacenter
hosts servers for many different clients, all of whom have access to the datacenter. None of the
racks are physically secured. Recently, the company has been the victim of several attacks
involving data injection and exfiltatration. The security administrator suspects these attacks are
due to several new network based attacks facilitated by having physical access to a system.
Which of the following BEST describes how to adapt to the threat?
What will you do to accomplish the task?
You are a newly appointed technician for uCertify Inc. You want to know more information about the hard
disk of a computer. What will you do to accomplish the task?
Which of the following should be used to identify overflow vulnerabilities?
Which of the following should be used to identify overflow vulnerabilities?
What will you do to accomplish the task?
You are a newly appointed technician for uCertify Inc. Before installing an application on your system, you
want to see how much free space is available on your C. drive. What will you do to accomplish the task?
Which of the following is noticed by http://test.com/modules.php?op=modload&name=XForum&file=[hostilej
A network administrator notices a security intrusion on the web server. Which of the following is
noticed by http://test.com/modules.php?op=modload&name=XForum&file=[hostilejavascript]&fid=2
in the log file?