Filters
Question type

Study Flashcards

List the five domains of the recommended maintenance model.

Correct Answer

verifed

verified

The recommended maintenance model is bas...

View Answer

There are ____ common vulnerability assessment processes.


A) two
B) three
C) four
D) five

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

The ____ vulnerability assessment process is designed to find and document selected vulnerabilities that are likely to be present on the internal network of the organization.


A) intranet
B) Internet
C) LAN
D) WAN

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Using scripted dialing attacks against a pool of phone numbers is often called war ____________________.

Correct Answer

verifed

verified

The primary goal of the ____________________ monitoring domain is to maintain an informed awareness of the state of all of the organization's networks,information systems,and information security defenses.

Correct Answer

verifed

verified

When the amount of data stored on a particular hard drive averages 30-40% of available capacity for a prolonged period,consider an upgrade for the hard drive.

A) True
B) False

Correct Answer

verifed

verified

The CISO uses the results of maintenance activities and the review of the information security program to determine if the status quo can adequately meet the threats at hand._________________________

A) True
B) False

Correct Answer

verifed

verified

One approach that can improve the situational awareness of the information security function uses a process known as ____ to quickly identify changes to the internal environment.


A) baseline
B) difference analysis
C) differential
D) revision

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

An example of the type of vulnerability exposed via traffic analysis occurs when an organization is trying to determine if all its device signatures have been adequately masked._________________________

A) True
B) False

Correct Answer

verifed

verified

All systems that are mission critical should be enrolled in PSV measurement.

A) True
B) False

Correct Answer

verifed

verified

Court decisions generally do not impact agency policy.

A) True
B) False

Correct Answer

verifed

verified

A ____ is the recorded state of a particular revision of a software or hardware configuration item.


A) state
B) version
C) configuration
D) baseline

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

A trouble ticket is closed when a user calls about an issue._________________________

A) True
B) False

Correct Answer

verifed

verified

The optimum approach for escalation is based on a thorough integration of the monitoring process into the ____.


A) IDE
B) CERT
C) ERP
D) IRP

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Rehearsals that closely match reality are called ____________________ games.

Correct Answer

verifed

verified

Detailed ____ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported.


A) escalation
B) intelligence
C) monitoring
D) elimination

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Each phase of the SDLC includes a(n)maximum set of information security-related activities required to effectively incorporate security into a system._________________________

A) True
B) False

Correct Answer

verifed

verified

The ____ mailing list includes announcements and discussion of an open-source IDPS.


A) Nmap-hackers
B) Packet Storm
C) Security Focus
D) Snort-sigs

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

____________________ is the process of reviewing the use of a system,not to check performance,but rather to determine if misuse or malfeasance has occurred.

Correct Answer

verifed

verified

A(n) ____ item is a hardware or software item that is to be modified and revised throughout its life cycle.


A) revision
B) update
C) change
D) configuration

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Showing 81 - 100 of 103

Related Exams

Show Answer