Which of the following is a low-tech way of gaining una…
Which of the following is a low-tech way of gaining unauthorized access to systems?
Which of the following is designed to identify maliciou…
Which of the following is designed to identify malicious attempts to penetrate systems?
Risks = Threats x Vulnerabilities is referred to as the:
Risks = Threats x Vulnerabilities is referred to as the:
What term describes the amount of risk that remains aft…
What term describes the amount of risk that remains after the vulnerabilities are classified and the
countermeasures have been deployed?
Which of these options is the most secure procedure for…
Which of these options is the most secure procedure for storing backup tapes?
Which one of the following tools would most likely be u…
To maintain compliance with regulatory requirements, a security audit of the systems on a network must be
performed to determine their compliance with security policies. Which one of the following tools would most
likely be used in such an audit?
What term is commonly used when referring to this type …
To determine if a software program properly handles a wide range of invalid input, a form of automated testing
can be used to randomly generate invalid input in an attempt to crash the program.
What term is commonly used when referring to this type of testing?
what kind of restriction?
The “white box testing” methodology enforces what kind of restriction?
what kind of restriction?
The “gray box testing” methodology enforces what kind of restriction?
which kind of restriction?
The “black box testing” methodology enforces which kind of restriction?