Ij Flashcards
(303 cards)
In the waterfall model which of the following evaluates a given product against the specifications written for the product
Verification
Verification evaluates the products performance to the acclaimed functionalities and production levels. It also compares the specifications of the product to the actual resulting product
When containing an Incident what is the first step that should always be taken
Secure the area and protect potential evidence
Based on the following asset information what is the organization single loss expectancy per hour?
Maintaining and updating their database cost $124,000 per year customer base revenue is $500,000 per year. For every hour of data compromise Or unavailability they could lose one percent of their customers
5,000
Chosen ciphertext attacks are mainly use against what kind of ciphers?
Pubic key
The risk of the following attack could be mitigated by software develop training
Buffer overflow
Which of the following relies on UDP
DHCP
Who is the primary user of an IDE
Software developer
A company has decided they need to separate the development team from the support team. According to general security principles what job function should be done by the development team
Software design
What protocol provides the user authentication authorization for remote client access?
802.1x
EAP-TLS
ChAP
RADIUS
RADIUS
Which distributed computing architecture is used extensively by web applications? Timesharing Three tier Peer to peer Client server
Three tier
An individual with secret level security clearance cannot read a document designed as top-secret. Which security model is is an example of?
Discretionary access control, Beba, Bell-lapadula or clark Wilson 
Bell la Padula
What type of memories typically use as cash memory?
Cashing random access memory, read only memory, dynamic random access memory, static random access memory
Static random access memory
During an evacuation who is responsible for checking that each individual that area has begun evacuation?
Door monitor, business unit manager, safety warden or meeting point leader
Safety warden
Which of the following is not a responsibility of an information owner?
Approving any disclosure activities, ensuring that the necessary security controls are in place, defining security requirements per classification of back up requirements or ensuring that proper access rights are being used in configuring them properly
Ensuring that proper access rights are being used in configuring them properly
Which of the following biometric access control measures the blood vessels in an eye?
I rescan, fingerprint, facial recognition or retina pattern
Retina pattern
Which of the following devices are read in written into a sequential order?
USB stick, solid-state drive, floppy drive or magnetic tape
Magnetic tape
Which of the following circumstances is computer application security most effective and economical?
When the system is optimized before the additional security, when the system as customers to meet specific security threat, when the system is Design from the beginning to provide the necessary security or when the system is purchase off-the-shelf
When the system is designed from beginning to provide the necessary security
When planning to perform a vulnerability assessment, a large international companies CIO decided to scan their entire IP address space. How can this affect the value of the scan?
The scan will review more problems that can be resolved in a reasonable time, the scan will have a high chance of failing before it completes, the network network will be unavailable while the scan is running or the scan will admit computers are not running at the time
The skin will reveal more problems than can be resolved in a reasonable time
What type of host discovery is used to find a live network systems that aren’t running responsive listing services?
Port scanning, Port monitoring, active or passive
Passive
Which of the following attributes could be used to qualify access control measures?
Administrative defensive detective, administrative preventive detective, associative preventive deterrent, associative preventive detective
Administrative preventive and detective
What is a driving factor in clearly stated data destruction policies?
Easy availability of archival info,
Pre-trial discovery during litigation,
historical records to advise policy makers,
or statistical analysis of past performance
Pretrial discovery during litigation
With regard to access control terminology when are built in subjects for an operating system defined?
When an administrator has a business need,
at that time the operating system is designed,
at the time the operating system is compiled
or when a new policy dictates the need for one
At the time the operating system is designed
Which of the following is example of a directive control?
Background check, encryption, Smart card or locks?
Background check
What is the number of UDP port that could be open on a system?
131,070, 131,072, 65,535 or 65,536
65,536