Which of the following security design patterns provides an alternative by requiring that a user's authentication credentials be verified by the database before providing access to that user's data?
#61
Answer: C✅ Correct❌ Incorrect
Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?
#62
Answer: A✅ Correct❌ Incorrect
Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls?
#63
Answer: C✅ Correct❌ Incorrect
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?
#64
Answer: B✅ Correct❌ Incorrect
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering, Determination of network range, Identification of active systems and Location of open ports and applications. Now, which of the following tasks should he perform next?
#65
Answer: A✅ Correct❌ Incorrect
Which of the following security models characterizes the rights of each subject with respect to every object in the computer system?
#66
Answer: D✅ Correct❌ Incorrect
Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.
#67
Answer: ACD✅ Correct❌ Incorrect
Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life?
#68
Answer: B✅ Correct❌ Incorrect
Which of the following SDLC phases consists of the given security controls: Misuse Case Modeling, Security Design and Architecture Review, Threat and Risk Modeling, Security Requirements and Test Cases Generation?
#69
Answer: D✅ Correct❌ Incorrect
Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.
#70
Answer: BCD✅ Correct❌ Incorrect
Which of the following sections come under the ISO/IEC 27002 standard?
#71
Answer: ABD✅ Correct❌ Incorrect
Which of the following statements about the authentication concept of information security management is true?
#72
Answer: A✅ Correct❌ Incorrect
Billy is the project manager of the HAR Project and is in month six of the project. The project is scheduled to last for 18 months. Management asks Billy how often the project team is participating in risk reassessment in this project. What should Billy tell management if he's following the best practices for risk management?
#73
Answer: D✅ Correct❌ Incorrect
Which of the following authentication methods is used to access public areas of a Web site?
#74
Answer: A✅ Correct❌ Incorrect
You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur?
#75
Answer: D✅ Correct❌ Incorrect
Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system?
#76
Answer: D✅ Correct❌ Incorrect
DRAG DROP -
Drop the appropriate value to complete the formula.
Select and Place:
Single Lost Expectancy (SLE) = Asset Value ($) x [x]
#77
Answer: A✅ Correct❌ Incorrect
In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?
#78
Answer: B✅ Correct❌ Incorrect
You work as a systems engineer for BlueWell Inc. Which of the following tools will you use to look outside your own organization to examine how others achieve their performance levels, and what processes they use to reach those levels?
#79
Answer: A✅ Correct❌ Incorrect
Which of the following methods determines the principle name of the current user and returns the jav a.security.Principal object in the HttpServletRequest interface?
#80
Answer: A✅ Correct❌ Incorrect
You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network. While auditing the company's network, you are facing problems in searching the faults and other entities that belong to it. Which of the following risks may occur due to the existence of these problems?
#81
Answer: C✅ Correct❌ Incorrect
You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management's objective for your project?
#82
Answer: A✅ Correct❌ Incorrect
Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?
#83
Answer: A✅ Correct❌ Incorrect
You are the project manager for GHY Project and are working to create a risk response for a negative risk. You and the project team have identified the risk that the project may not complete on time, as required by the management, due to the creation of the user guide for the software you're creating. You have elected to hire an external writer in order to satisfy the requirements and to alleviate the risk event. What type of risk response have you elected to use in this instance?
#84
Answer: A✅ Correct❌ Incorrect
Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive
Branch agencies?
#85
Answer: A✅ Correct❌ Incorrect
Which of the following software review processes increases the software security by removing the common vulnerabilities, such as format string exploits, race conditions, memory leaks, and buffer overflows?
#86
Answer: B✅ Correct❌ Incorrect
Which of the following governance bodies directs and coordinates implementations of the information security program?
#87
Answer: A✅ Correct❌ Incorrect
In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?
#88
Answer: B✅ Correct❌ Incorrect
Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?
#89
Answer: A✅ Correct❌ Incorrect
Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle?