Set 01 Flashcards
(10 cards)
Q11: This method begins by asking “What is the overall goal of the system enterprise”
A. Systems-Theoretic Accident Model and Process
B. The Open Group Architectural Framework
C. SABSA
D. Dependency Modeling
D. Dependency Modeling
Q12: Which of the following options is not an element of Information Security? A. Reliability B. Integrity C. Confidentiality D. Availability
A. Reliability
Q13: \_\_\_\_\_ allow scholars, engineers, auditors, and regulators to examine how security controls operate to ensure their correctness, or identify flaws without undermining their security. A. Least common mechanism B. Open design C. Least privilege D. Least access
B. Open design
Q14: GDPR brought about a significant change in the \_\_\_\_\_ jurisdiction of European data protection law. A. Territorial prescriptive B. Territorial assertive C. Territorial data protection D. None of above
A. Territorial prescriptive
Q15: The pcap library needs the accessibility to a network interface that can be employed in alleged promiscuous mode, which means that interface will recover all packets from the network, even those packets that are not requested to it, it is not required to bind an IP address to the network interface to capture traffic.
Binding of IP address to the network interface is essential to do what?
A. General maintenance and traffic monitoring
B. Capture traffic
C. Security and incident management
D. Traffic Configuration
C. Security and incident management
Q16: The privacy knowledge area is structured in different sections, which is consider part of this paradigm? A. As informational control B. As confidentiality C. As transparency D. All of the above
D. All of the above
Q17: Criteria by which usability is assessed? A. Incompetency B. Incapacity C. Indecision D. None of above
D. None of above
Q18: Memory-resident malware such that if the computer is rebooted or the infected running program terminates, it no longer exists anywhere on the system and can evade detection by many anti-virus systems that rely on file scanning.
What is the advantage of memory-resident malware?
A. It can easily clean up its attack operations right after its execution ANS
B. A memory resident malware has no advantage in the context of hiding its attack operation.
C. Cleaning up its attacks is possible, but it may require additional malware utilities.
D. It is difficult to clean up its attack operations if the compromised system is guarded by real-time anti-virus program.
A. It can easily clean up its attack operations right after its execution ANS
Q19: What theme is of high relevance regarding the cost versus benefits trade-offs of security to user systems and cybercriminals. A. Verification Method B. Security Architecture C. Security Economics D. None of above
C. Security Economics
Q20: The golden arches of McDonald's are protected under what intellectual property law? A. Trade secret B. Copyright C. Logo protection D. Trademark
D. Trademark