Which of the following concepts represent the three fundamental principles of information security?
Which of the following concepts represent the three fundamental principles of information
security? Each correct answer represents a complete solution. Choose three.
Which of the following DoS attacking techniques will she use to accomplish the task?
Samantha works as an Ethical Hacker for we-are-secure Inc. She wants to test the security of the
we-are-secure server for DoS attacks. She sends large number of ICMP ECHO packets to the
target computer. Which of the following DoS attacking techniques will she use to accomplish the
task?
Which of the following patterns does it include?
The DARPA paper defines various procedural patterns to perform secure system development
practices. Which of the following patterns does it include? Each correct answer represents a
complete solution. Choose three.
which of the following SDLC phases is the system’s security features configured and enabled, the system&
In which of the following SDLC phases is the system’s security features configured and enabled,
the system is tested and installed or fielded, and the system is authorized for processing?
Which of the following tests should John use to accomplish the task?
John works as a systems engineer for BlueWell Inc. He has modified the software, and wants to
retest the application to ensure that bugs have been fixed or not. Which of the following tests
should John use to accomplish the task?
Which of the following test methods has the objective to test the IT system from the viewpoint of a threat-sou
Which of the following test methods has the objective to test the IT system from the viewpoint of a
threat-source and to identify potential failures in the IT system protection schemes?
which is most useful for the ISSE when classifying the needed security functionality?
Which of the following documents is defined as a source document, which is most useful for the
ISSE when classifying the needed security functionality?
Which of the following procedures will you employ to accomplish the task?
You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software
project using configuration management and has completed 70% of it. You need to ensure that the
network infrastructure devices and networking standards used in this project are installed in
accordance with the requirements of its detailed project design documentation. Which of the
following procedures will you employ to accomplish the task?
Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed?
FITSAF stands for Federal Information Technology Security Assessment Framework. It is a
methodology for assessing the security of information systems. Which of the following FITSAF
levels shows that the procedures and controls are tested and reviewed?
Which of the following ISO standards is entitled as "Information technology – Security techniques -
Which of the following ISO standards is entitled as “Information technology – Security techniques -Information security management – Measurement”?