Filters
Question type

The basic function of the external monitoring process is to monitor activity, report results, and escalate warnings. _________________________

A) True
B) False

Correct Answer

verifed

verified

A(n) war game puts a subset of plans in place to create a realistic test environment. _________________________

A) True
B) False

Correct Answer

verifed

verified

In some organizations, facilities management is the identification, inventory, and documentation of the current information system's status-hardware, software, and networking configurations. _________________________

A) True
B) False

Correct Answer

verifed

verified

To be put to the most effective use, the information that comes from the IDPS must be integrated into the inventory process. _________________________

A) True
B) False

Correct Answer

verifed

verified

You can document the results of the verification of a vulnerability by saving the results in what is called a(n) profile. _________________________

A) True
B) False

Correct Answer

verifed

verified

The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to be present on the organization's internal network.


A) intranet
B) Internet
C) LAN
D) WAN

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

In some instances, risk is acknowledged as being part of an organization's business process.

A) True
B) False

Correct Answer

verifed

verified

Documenting information system changes and assessing their potential impact on system security is an important and consequential part of digital forensics.

A) True
B) False

Correct Answer

verifed

verified

A chain of custody is the detailed documentation of the collection, storage, transfer, and ownership of evidence from the crime scene through its presentation in court. ___________

A) True
B) False

Correct Answer

verifed

verified

Common vulnerability assessment processes include:


A) Internet VA
B) wireless VA
C) intranet VA
D) All of these

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A maintenance ​ticket is opened when a user calls about an issue. _________________________

A) True
B) False

Correct Answer

verifed

verified

Inventory characteristics for hardware and software assets that record the manufacturer and versions are related to technical functionality, and should be highly accurate and updated each time there is a change.

A) True
B) False

Correct Answer

verifed

verified

The ____________________ step in the intranet vulnerability assessment is identical to the one followed in Internet vulnerability analysis.

Correct Answer

verifed

verified

____________________ interconnections are the network devices, communications channels, and applications that may not be owned by the organization but are essential to the organization's cooperation with another company.

Correct Answer

verifed

verified

Policy needs to be reviewed and refreshed from time to time to ensure that it's providing a current foundation for the information security program.

A) True
B) False

Correct Answer

verifed

verified

In ____________________ selection, all areas of the organization's premises should be scanned with a portable wireless network scanner.

Correct Answer

verifed

verified

In digital forensics, all investigations follow the same basic methodology once permission for search and seizure has been obtained. Which of the following is NOT one of the elements of that process?


A) Analyze the data without risking modification or unauthorized access.
B) Report the findings to the proper authority.
C) Determine whether to "apprehend and prosecute."
D) Identify relevant EM.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

The __________ mailing list includes announcements and discussion of a leading open-source IDPS.


A) Nmap-hackers
B) Packet Storm
C) Security Focus
D) Snort

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.


A) ASP
B) ISP
C) SVP
D) PSV

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

The vulnerability database, like the risk, threat, and attack database, both stores and tracks information.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 116

Related Exams

Show Answer