Question 1
The most common certification expected of a Chief Information Security Officer is the _____ .Selected Answer: 
 CISSPCorrect Answer: 
 CISSPQuestion 2
It is perfectly legal to continue using an existing Halon fire protection system in the United States.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 3
____ occurs when an authorized individual presents a key to open a door, and other individuals, who may or may not be authorized, also enter through.Selected Answer: 
 TailgatingCorrect Answer: 
 TailgatingQuestion 4
The steps of the Internet vulnerability assessment include ____, which is when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.Selected Answer: 
 ScanningCorrect Answer: 
 ScanningQuestion 5
The ____ layer of the bull"s-eye model receives attention last.Selected Answer: 
 ApplicationsCorrect Answer: 
 ApplicationsQuestion 6
The ____ level of the bull"s-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate, and enables all other information security components to function correctly and have the desired effects in improving the organization"s information security program.Selected Answer: 
 PoliciesCorrect Answer: 
 PoliciesQuestion 7
Class ____ fires involve ordinary combustible fuels such as wood and paper.Selected Answer: 
 ACorrect Answer: 
 AQuestion 8
The digital forensics team must be able to demonstrate that any analyzed copy or image is a true and accurate replica of the source material. This is typically accomplished by usingcryptographic hash tools.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 9
Chain of custody is the detailed documentation of the collection, storage, transfer, and ownership of collected evidence from the crime scene through its presentation in court.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 10
In general, the research seems to suggest that while many organizations believe that the CISO/CSO should function as an independent, executive-level decision maker, infomation security and the ____ department are currently too closely aligned to separate into two departments.Selected Answer: 
 information technologyCorrect Answer: 
 information technologyQuestion 11
There are three methods of data interception: direct observation, interception of data transmission, and mechanical interception.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 12
_________ is the process of reviewing the use of a system to determine if misuse or malfeasance has occurred.Selected Answer: 
 AuditingCorrect Answer: 
 AuditingQuestion 13
Each organization has to determine its own project management methodology for IT and information security projects.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 14
The idea that employees should be provided access to the minimum amount of information for the minimum amount of time necessary for them to perform their duties is known as (the) __________ .Selected Answer: 
 principle of least privilegeCorrect Answer: 
 principle of least privilegeQuestion 15
In the ____ approach, the sensor detects an unusually rapid increase in the area temperature within a relatively short period of time.Selected Answer: 
 rate-of-riseCorrect Answer: 
 rate-of-riseQuestion 16
The position of security technician is often offered as an entry-level position.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 17
The security manager position has more general responsibilities than that of CISO.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 18
The information security function can reasonably be placed within ____.Selected Answer: 
 All of the aboveCorrect Answer: 
 All of the aboveQuestion 19
____ is a cornerstone in the protection of information assets and in the prevention of financial loss.Selected Answer: 
 Separation of dutiesCorrect Answer: 
 Separation of dutiesQuestion 20
____ sensors project and detect an infrared beam across an area to detect smoke.Selected Answer: 
 PhotoelectricCorrect Answer: 
 PhotoelectricQuestion 21
In the offline method of data acquisition for evidence gathering, a sector-by-sector copy of hard drives is made after the investigator has removed the power source in the target system.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 22
To maintain a secure facility, contract employees (such as electricians or vendor repair staff) should be escorted from room to room, as well as into and out of the facility.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 23
The interior walls reach only part way to the next floor, which leaves a space above the ceiling of the offices but below the top of the story. This space is called a(n) ____.Selected Answer: 
 plenumCorrect Answer: 
 plenumQuestion 24
Hostile departures include termination for cause, permanent downsizing, temporary lay-off, and some instances of quitting.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 25
In the Schwartz, Erwin, Weafer, and Briney model, ____ are the real techies, who create and install security solutions.Selected Answer: 
 buildersCorrect Answer: 
 builders
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY EXAM 3
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment