Which of the following testing methods tests the system efficiency by systematically selecting the suitable and minimum set of tests that are required to effectively cover the affected changes?
#121
Answer: D✅ Correct❌ Incorrect
Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information?
#122
Answer: B✅ Correct❌ Incorrect
Which of the following methods is a means of ensuring that system changes are approved before being implemented, only the proposed and approved changes are implemented, and the implementation is complete and accurate?
#123
Answer: A✅ Correct❌ Incorrect
FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals?
#124
Answer: B✅ Correct❌ Incorrect
You work as the senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items
(CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?
#125
Answer: B✅ Correct❌ Incorrect
Bill is the project manager of the JKH Project. He and the project team have identified a risk event in the project with a high probability of occurrence and the risk event has a high cost impact on the project. Bill discusses the risk event with Virginia, the primary project customer, and she decides that the requirements surrounding the risk event should be removed from the project. The removal of the requirements does affect the project scope, but it can release the project from the high risk exposure. What risk response has been enacted in this project?
#126
Answer: D✅ Correct❌ Incorrect
Martha registers a domain named Microsoft.in. She tries to sell it to Microsoft Corporation. The infringement of which of the following has she made?
#127
Answer: B✅ Correct❌ Incorrect
Which of the following is a variant with regard to Configuration Management?
#128
Answer: C✅ Correct❌ Incorrect
You are the project manager for your organization. You are preparing for the quantitative risk analysis. Mark, a project team member, wants to know why you need to do quantitative risk analysis when you just completed qualitative risk analysis. Which one of the following statements best defines what quantitative risk analysis is?
#129
Answer: D✅ Correct❌ Incorrect
You work as a security engineer for BlueWell Inc. According to you, which of the following DITSCAP/NIACAP model phases occurs at the initiation of the project, or at the initial C&A effort of a legacy system?
#130
Answer: B✅ Correct❌ Incorrect
Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.
#131
Answer: A✅ Correct❌ Incorrect
The build environment of secure coding consists of some tools that actively support secure specification, design, and implementation. Which of the following features do these tools have? Each correct answer represents a complete solution. Choose all that apply.
#132
Answer: ACD✅ Correct❌ Incorrect
Stella works as a system engineer for BlueWell Inc. She wants to identify the performance thresholds of each build. Which of the following tests will help Stella to achieve her task?
#133
Answer: B✅ Correct❌ Incorrect
Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production? Each correct answer represents a part of the solution. Choose all that apply.
#134
Answer: BD✅ Correct❌ Incorrect
What are the security advantages of virtualization, as described in the NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on
Cloud Computing and Standards"? Each correct answer represents a complete solution. Choose three.
#135
Answer: BCD✅ Correct❌ Incorrect
Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system?
#136
Answer: C✅ Correct❌ Incorrect
DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997. What phases are identified by DIACAP? Each correct answer represents a complete solution. Choose all that apply.
#137
Answer: ABEF✅ Correct❌ Incorrect
Which of the following are the goals of risk management? Each correct answer represents a complete solution. Choose three.
#138
Answer: ABD✅ Correct❌ Incorrect
Which of the following provides an easy way to programmers for writing lower-risk applications and retrofitting security into an existing application?
#139
Answer: B✅ Correct❌ Incorrect
In which of the following deployment models of cloud is the cloud infrastructure operated exclusively for an organization?
#140
Answer: C✅ Correct❌ Incorrect
The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound SCM process is implemented? Each correct answer represents a complete solution. Choose all that apply.
#141
Answer: ABCD✅ Correct❌ Incorrect
At which of the following levels of robustness in DRM must the security functions be immune to widely available tools and specialized tools and resistant to professional tools?
#142
Answer: D✅ Correct❌ Incorrect
Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
#143
Answer: B✅ Correct❌ Incorrect
Which of the following types of obfuscation transformation increases the difficulty for a de-obfuscation tool so that it cannot extract the true application from the obfuscated version?
#144
Answer: A✅ Correct❌ Incorrect
Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?
#145
Answer: C✅ Correct❌ Incorrect
Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?
#146
Answer: A✅ Correct❌ Incorrect
Which of the following programming languages are compiled into machine code and directly executed by the CPU of a computer system? Each correct answer represents a complete solution. Choose two.
#147
Answer: AD✅ Correct❌ Incorrect
Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?
#148
Answer: C✅ Correct❌ Incorrect
You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of
Federal Information Systems?
#149
Answer: C✅ Correct❌ Incorrect
Which of the following is an example of over-the-air (OTA) provisioning in digital rights management?