Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
Which of the following roles is responsible for review and risk analysis of all contracts on a regular
basis?
Which number should he have registered?
Carl just purchased an expensive smart phone to use for personal and business use. Carl wants
to protect his investment so he decides to register the unique GSM number of the phone in case it
is ever stolen. Which number should he have registered?
Which of the following statements about a certification authority (CA) is true?
Which of the following statements about a certification authority (CA) is true?
What privileges has Paul logged on with?
Paul wants to capture audit information on PLSQL so he executes the following command:
sqlplus “sys / as sysdba”
Enter password: password123!!!!
SQL> ALTER SYSTEM SET AUDIT_TRAIL = OS
SCOPE=SPFILE;
SQL> SHUTDOWN NORMAL;
SQL> STARTUP;
What privileges has Paul logged on with?
Which of the following statements are true about BS 7799?
BS 7799 is an internationally recognized ISM standard that provides high level, conceptual
recommendations on enterprise security. BS 7799 is basically divided into three parts. Which of
the following statements are true about BS 7799?
Each correct answer represents a complete solution. Choose all that apply.
what will be accomplished?
George is writing an application in Java and is using DES in the code to implement the encryption
and decryption of data that will be passed. In the following code snippet, what will be
accomplished?
FileOutputStream out = newFileOutputStream
(f);
out.write(rawkey);
Which policy does this pertain to?
An organization monitors the hard disks of its employees’ computers from time to time. Which
policy does this pertain to?
What PERL command could Charles use to elevate the current user’s permission so that the file could be calle
Charles is writing a script in PERL for a website he is working on. The only problem he is having is
that part of his script needs to call a file that a normal user does not have permission to access.
What PERL command could Charles use to elevate the current user’s permission so that the file
could be called?
____________ privilege escalation is the process of attempting to access sources with a higher access, such as
Fill in the blank with the appropriate phrase.
____________ privilege escalation is the process of attempting to access sources with a higher
access, such as a user account trying to access admin privileges.
Which of the following disaster recovery tests includes the operations that shut down at the primary site̷
Which of the following disaster recovery tests includes the operations that shut down at the
primary site, and are shifted to the recovery site according to the disaster recovery plan?