Set 01 Flashcards

(10 cards)

1
Q

Q11: This method begins by asking “What is the overall goal of the system enterprise”
A. Systems-Theoretic Accident Model and Process
B. The Open Group Architectural Framework
C. SABSA
D. Dependency Modeling

A

D. Dependency Modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Q12: Which of the following options is not an element of Information Security?
A. Reliability
B. Integrity
C. Confidentiality
D. Availability
A

A. Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Q13: \_\_\_\_\_ allow scholars, engineers, auditors, and regulators to examine how security controls operate to ensure their correctness, or identify flaws without undermining their security.
A. Least common mechanism
B. Open design
C. Least privilege
D. Least access
A

B. Open design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Q14: GDPR brought about a significant change in the \_\_\_\_\_ jurisdiction of European data protection law.
A. Territorial prescriptive
B. Territorial assertive
C. Territorial data protection
D. None of above
A

A. Territorial prescriptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q15: The pcap library needs the accessibility to a network interface that can be employed in alleged promiscuous mode, which means that interface will recover all packets from the network, even those packets that are not requested to it, it is not required to bind an IP address to the network interface to capture traffic.
Binding of IP address to the network interface is essential to do what?
A. General maintenance and traffic monitoring
B. Capture traffic
C. Security and incident management
D. Traffic Configuration

A

C. Security and incident management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Q16: The privacy knowledge area is structured in different sections, which is consider part of this paradigm?
A. As informational control
B. As confidentiality
C. As transparency
D. All of the above
A

D. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Q17: Criteria by which usability is assessed?
A. Incompetency
B. Incapacity
C. Indecision
D. None of above
A

D. None of above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q18: Memory-resident malware such that if the computer is rebooted or the infected running program terminates, it no longer exists anywhere on the system and can evade detection by many anti-virus systems that rely on file scanning.
What is the advantage of memory-resident malware?
A. It can easily clean up its attack operations right after its execution ANS
B. A memory resident malware has no advantage in the context of hiding its attack operation.
C. Cleaning up its attacks is possible, but it may require additional malware utilities.
D. It is difficult to clean up its attack operations if the compromised system is guarded by real-time anti-virus program.

A

A. It can easily clean up its attack operations right after its execution ANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Q19: What theme is of high relevance regarding the cost versus benefits trade-offs of security to user systems and cybercriminals.
A. Verification Method
B. Security Architecture
C. Security Economics
D. None of above
A

C. Security Economics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Q20: The golden arches of McDonald's are protected under what intellectual property law?
A. Trade secret
B. Copyright
C. Logo protection
D. Trademark
A

D. Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly