which TMap phase is testing ‘dynamic implicit’?
During which TMap phase is testing ‘dynamic implicit’?
Which of the following defines an event where an alarm does not occur and there is no actual intrusion?
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You
read about the different types of alarms and events. Which of the following defines an event where
an alarm does not occur and there is no actual intrusion?
Which test design technique can be used to test performance?
Which test design technique can be used to test performance?
What are these contracts called?
In many organizations, management tasks or parts of those tasks are performed t>y third parties.
Agreements are made with these parties that are expressed in contracts.
What are these contracts called?
What is the minimum level of frequency with which these Plans should be developed and reviewed?
Availability and Service Continuity Plans need to be developed and reviewed periodically to
ensure that requirements are met as agreed in all circumstances, from normal operations through
to a major loss of service. What is the minimum level of frequency with which these Plans should
be developed and reviewed?
Which of the following are managed by facilities management?
Which of the following are managed by facilities management?
1. Hardware within a data centre or computer room
2. Applications
3. Power and cooling equipment
4. Recovery sites
What type of attack was used against your network?
It has come to your attention that some machine has tried to send a packet to your DNS server
containing both a DNS query and an answer that is false. What type of attack was used against
your network?
Which statement is true about the SMFs in the Operate Phase?
Which statement is true about the SMFs in the Operate Phase?
which coverage type does this refer?
The possible results of every condition are tested at least once. To which coverage type does this
refer?
Which of the following are the reasons that the current auditing has little value?
You were recently hired as the security administrator of a small business. You are reviewing the
current state of security in the network and find that the current logging system must be
immediately modified. As the system is currently configured, auditing has no practical value.
Which of the following are the reasons that the current auditing has little value?