which test design technique is this an example?
Which of the following defines an event where an alarm does not occur and there is no actual intrusion?
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You
read about the different types of alarms and events. Which of the following defines an event where
an alarm does not occur and there is no actual intrusion?
How many equivalence classes are included in this situation?
A fun park is celebrating its 25th birthday and has come up with the following discount campaign:
Everybody is given 50% discount on their admission ticket. Children younger than 4 years, adults
older than 64 years, and for this special occasion adults aged 25 years will be allowed in free.
How many equivalence classes are included in this situation?
Which of the following are the reasons that the current auditing has little value?
You were recently hired as the security administrator of a small business. You are reviewing the
current state of security in the network and find that the current logging system must be
immediately modified. As the system is currently configured, auditing has no practical value.
Which of the following are the reasons that the current auditing has little value?
What is recorded in a test plan?
What is recorded in a test plan?
Which of the following best describes an Operational audit?
The main reason you have been hired at a company is to bring the network security of the
organization up to current standards. A high priority is to have a full security audit of the network
as soon as possible. You have chosen an Operational Audit and are describing it to your
coworkers. Which of the following best describes an Operational audit?
How many logical test cases can be generated if a semantic test using the coverage type decision points modifi
Which of the following best describes an Independent Audit?
The main reason you have been hired at a company is to bring the network security of the
organization up to current standards. A high priority is to have a full security audit of the network
as soon as possible. You have chosen an Independent Audit and are describing it to your
coworkers. Which of the following best describes an Independent Audit?
Which activity takes place in the Preparation phase?
Which activity takes place in the Preparation phase?
Which of the following best describes Authentication?
You have been hired at a large company to manage network security issues. Prior to your arrival,
there was no one dedicated to security, so you are starting at the beginning. You hold a meeting
and are discussing the main functions and features of network security. One of your assistants
asks what the function of Authentication in network security is. Which of the following best
describes Authentication?