Sec +3

Is this your test? Login to manage it. If not, you can make a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Backing up data by sending it through a communications line to a remote location is known as
2.
1 point
Two-factor authentication is so called because
3.
1 point
Which of the following is NOT a value of change control in the software development life cycle?
4.
1 point
What's one disadvantage of an organization signing its own certificates?
5.
1 point
Which agency has jurisdiction over computer crimes in the United States?
6.
1 point
Configuration Management is used to
7.
1 point
Why would a dry-pipe sprinkler be preferred over a wet-pipe sprinkler?
8.
1 point
The purpose of an operating system is to
9.
1 point
The purpose of risk analysis is
10.
1 point
Which of the following is a disadvantage of SSL?
11.
1 point
Which of the following is NOT a method used to create an online redundant data set?
12.
1 point
The phrase something you are refers to
13.
1 point
How does the Waterfall software development life cycle help to assure that applications will be secure?
14.
1 point
The ability for a government agency to wiretap a data connection was implemented in the
15.
1 point
Under what circumstances may evidence be seized without a warrant?
16.
1 point
The traces of original data remaining after media erasure are known as
17.
1 point
Why should a datacenter's walls go all the way to the ceiling and not just stop as high as the suspended ceiling?
18.
1 point
Protection rings are used for
19.
1 point
Annualized Rate of Occurrence refers to
20.
1 point
An access control list is NOT used by
21.
1 point
A DRP that has a high RPO and a low RTO will result in
22.
1 point
Two-factor authentication is stronger than single-factor authentication because
23.
1 point
The main purpose of configuration management is to
24.
1 point
The cipher device used by Germany in World War II is known as
25.
1 point
Motive, means, and opportunity
26.
1 point
Software controls are used to
27.
1 point
Which of the following are NOT fire detectors?
28.
1 point
The TCSEC document is known as the Orange Book because
29.
1 point
Single Loss Expectancy refers to
30.
1 point
What is the purpose of the DHCP protocol?
31.
1 point
The purpose of a BIA is
32.
1 point
An organization has recently implemented a palm-scan biometric system to control access to sensitive zones in a building. Some employees have objected to the biometric system for sanitary reasons. The organization should
33.
1 point
A security specialist has discovered that an application her company produces has a JavaScript injection vulnerability. What advice should the security specialist give to the application's developers?
34.
1 point
Cryptography can be used for all the following situations EXCEPT
35.
1 point
The burden of proof in U.S. civil law is
36.
1 point
An organization may choose to perform periodic background checks on its employees for all the following reason EXCEPT
37.
1 point
Which class of hand-held fire extinguisher should be used in a datacenter
38.
1 point
All the following CPU's are CISC design EXCEPT
39.
1 point
A system architect has designed a system that is protected with redundant parallel firewalls. This follows which security design principle?
40.
1 point
The type of cable that is best suited for high RF and EMF environments is
41.
1 point
A disaster Recovery Planning team has been told by management that the equipment required to meet RTO and RPO targets is too costly. What's the best course of action to take?
42.
1 point
A security manager is planning a new video surveillance system. The manager wants the video surveillance system to be both a detective control and a deterrent control. What aspect of the system's design will achieve this objective?
43.
1 point
Privacy advocates organizations are concerned about the practices of aggregation, which involves
44.
1 point
A cipher uses a table to replace plain text characters with cipher text characters. This type of cipher is known as
45.
1 point
Under U.S. law, the amount of a fine and the length of imprisonment are based on
46.
1 point
An organization has identified a high-risk activity that's performed by a single individual. The organization will change the activity so that two or more individuals are required to perform the task. This new setup is known as
47.
1 point
An organization wants to erect fencing around its property to keep out determined intruders. What are the minimum specifications that the organization should consider?
48.
1 point
Which type of technology is a computer designer most likely to use for main memory?
49.
1 point
A document that lists the equipment brands, programming languages, and communications protocols to be used in an organization is a
50.
1 point
Which of the following is true about Digital Subscriber Line