Sec + 2

Is this your test? Login to manage it. If not, you can make a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
The Disaster Recovery Plan (DRP) needs to be continuously maintained because:
2.
1 point
Security guards, locked doors, and surveillance cameras are known as
3.
1 point
Neural networking gets its name from
4.
1 point
The process of hiding a message inside a larger data set is known as
5.
1 point
Enticement is defined as
6.
1 point
The practice of separation of duties
7.
1 point
Tailgating is a term describing what activity?
8.
1 point
Which of the following is NOT a security issue with distributed architectures?
9.
1 point
What's the purpose of a senior management statement of security policy?
10.
1 point
What is the purpose of RARP?
11.
1 point
How is the organization's DRP best kept up-to-date?
12.
1 point
Role-based access control and task-based access control are examples of
13.
1 point
The verification activity associated with coding is called
14.
1 point
Steganography isn't easily noticed because
15.
1 point
The purpose of a honeypot is to
16.
1 point
Which of the following tasks would NOT be performed by security administrator?
17.
1 point
What does fail open mean in the context of controlled building entrances?
18.
1 point
TCB is an acronym for
19.
1 point
What is the purpose of an "advisory policy"?
20.
1 point
132.116.72.5 is a
21.
1 point
An organization that's developing its DRP has established a 20 minute Recovery Time Objective (RTO). Which solution will best support this
22.
1 point
Audits, background checks, video cameras, and listening devices are known as
23.
1 point
What's the primary input of a high-level product design?
24.
1 point
What historic event was the backdrop for breakthroughs in strategic cryptography?
25.
1 point
Which of the following is NOT a precaution that needs to be taken before monitoring e-mail?
26.
1 point
What's the potential security benefit of rotation of duties?
27.
1 point
What does fail closed mean in the context of controlled building entrances?
28.
1 point
The sum total of all protection mechanisms in a system is known as a
29.
1 point
What is the definition of a "threat"
30.
1 point
04:c6:d1:45:87:E8 is a
31.
1 point
Which of the following is NOT natural disaster?
32.
1 point
Smart cards, fences, guard dogs, and card key access are known as
33.
1 point
The main improvement of the Waterfall software life cycle model over earlier process models is
34.
1 point
Non-repudiation refers to
35.
1 point
Intellectual property laws apply to
36.
1 point
The process of reviewing and approving changes in production systems is known as
37.
1 point
A water sprinkler system that's characterized as always having water in the pipes is known as
38.
1 point
The mechanism that overlaps hardware instructions to increase performance is known as
39.
1 point
A weakness in a security control is called a
40.
1 point
The "Ping" command sends
41.
1 point
The term remote journaling refers to
42.
1 point
Is identification weaker than authentication?
43.
1 point
A project team is at the beginning stages of a new software development project. The team wants to ensure that the security features are present in the completed software application. In what stage should security be introduced?
44.
1 point
The amount of effort required to break a given ciphertext is known as
45.
1 point
In order to be admissible, electronic evidence must
46.
1 point
The process of maintaining and documenting software versions and settings is known as
47.
1 point
A water sprinkler system that charges the pipes when it receives a heat or smoke alarm, and then discharges the water when a higher ambient temperature is reached, is known as
48.
1 point
FORTRAN, BASIC, and C are known aas
49.
1 point
A security control intended to reduce risk is called a
50.
1 point
SMTP is used to