Which of the following solutions will be the best for the organization?
An organization is seeking to implement a hot site and wants to maintain a live database server at
the backup site. Which of the following solutions will be the best for the organization?
Which of the following statements best explains how encryption works on the Internet?
Which of the following statements best explains how encryption works on the Internet?
Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer
Which of the following is a standard that sets basic requirements for assessing the effectiveness of
computer security controls built into a computer system
What type of attack has just occurred?
A helpdesk technician received a phone call from an administrator at a remote branch office. The
administrator claimed to have forgotten the password for the root account on UNIX servers and
asked for it. Although the technician didn’t know any administrator at the branch office, the guy
sounded really friendly and since he knew the root password himself, he supplied the caller with
the password. What type of attack has just occurred?
which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?
Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data
from applicants, such as national origin, caste, religion etc?
Choose all that apply
What NIACAP certification levels are recommended by the certifier Each correct answer
represents a complete solution. Choose all that apply.
Which of the following utilities will you use to diagnose the problem?
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution
problem. Which of the following utilities will you use to diagnose the problem?
Which of the following security models deal only with integrity?
Which of the following security models deal only with integrity? Each correct answer represents a
complete solution. Choose two.
Which of the following NIST SP 800-53A interviews consists of informal and ad hoc interviews
NIST SP 800-53A defines three types of interview depending on the level of assessment
conducted. Which of the following NIST SP 800-53A interviews consists of informal and ad hoc
interviews
Which of the following components reduces the size of data transmitted over congested network connections and
The IPSec protocol is configured in an organization’s network in order to maintain a complete
infrastructure for secured network communications. IPSec uses four components for this. Which of
the following components reduces the size of data transmitted over congested network
connections and increases the speed of such networks without losing data?