Topic 2, Exam Pool B
All of the following are activities that should be performed when capturing and maintaining
an accurate, secure system baseline, except ____________.
Response:
A.
Audit the baseline to ensure that all configuration items have been included and applied
correctly
B.
Impose the baseline throughout the environment
C.
Capture an image of the baseline system for future reference/versioning/rollback
purposes
D.
Document all baseline configuration elements and versioning data
Impose the baseline throughout the environment
What is the risk to the organization posed by dashboards that display data discovery
results?
Response:
A.
Increased chance of external penetration
B.
Flawed management decisions based on massaged displays
C.
Higher likelihood of inadvertent disclosure
D.
Raised incidence of physical theft
Flawed management decisions based on massaged displays
Firewalls can detect attack traffic by using all these methods except ____________.
Response:
A.
Known past behavior in the environment
B.
Identity of the malicious user
C.
Point of origination
D.
Signature matching
Identity of the malicious user
According to OWASP recommendations, active software security testing should include all
of the following except ____________.
Response:
A.
Session initiation testing
B.
Input validation testing
C.
Testing for error handling
D.
Testing for weak cryptography
Session initiation testing
Which of the following is NOT one of the cloud computing activities, as outlined in ISO/IEC
17789?
Response:
A.
Cloud service provider
B.
Cloud service partner
C.
Cloud service administrator
D.
Cloud service customer
Cloud service administrator
Page 27 out of 103 Pages |
Previous |