Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for this purpose?
You work as the Network Administrator for a defense contractor. Your company works with sensitive materials and all IT personnel have at least a secret level clearance. You are still concerned that one individual could perhaps compromise the network (intentionally or unintentionally) by setting up improper or unauthorized remote access. What is the best way to avoid this problem?
Which of the following is a process of monitoring data packets that travel across a network?
Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.
Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?
Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.
Which of the following security models dictates that subjects can only access objects through applications?
In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?
Which of the following statements best explains how encryption works on the Internet?
You are the Network Administrator for a software company. Due to the nature of your company's business, you have a significant number of highly computer savvy users. However, you have still decided to limit each user access to only those resources required for their job, rather than give wider access to the technical users (such as tech support and software engineering personnel). What is this an example of?
Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.
Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?
Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.
How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?
Which of the following liabilities is a third-party liability in which an individual may be responsible for an action by another party?
Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?
Which of the following relies on a physical characteristic of the user to verify his identity?
The goal of Change Management is to ensure that standardized methods and procedures are used for efficient handling of all changes. Which of the following are Change Management terminologies? Each correct answer represents a part of the solution. Choose three.
In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?
Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?
You work as a Forensic Investigator. Which of the following rules will you follow while working on a case? Each correct answer represents a part of the solution. Choose all that apply.
Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?
You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?
John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the following US laws will john be charged?
What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.
Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. Choose three.