Topic 1: Exam Pool A
Which of the following BEST provides continuous availability of network bandwidth for critical application services?
A.
Configuration management
B.
Quality of service (QoS)
C.
Cloud computing
D.
Problem management
Quality of service (QoS)
Which of the following is MOST likely to enable a hacker to successfully penetrate a system?
A.
Unpatched software
B.
Decentralized dialup access
C.
Lack of DoS protection
D.
Lack of virus protection
Unpatched software
The operations team of an organization has reported an IS security attack. Which of the following should be the NEXT step for the security incident response team?
A.
Perform a damage assessment
B.
Report results to management.
C.
Document lessons learned
D.
Prioritize resources for corrective action
Prioritize resources for corrective action
Which of the following should be done FIRST when planning a penetration test?
A.
Execute nondisclosure agreements (NDAs).
B.
Define the testing scope.
C.
Determine reporting requirements for vulnerabilities
D.
Obtain management consent for the testing
Execute nondisclosure agreements (NDAs).
To help ensure the accuracy and completeness of end-user computing output it is MOST important to include strong:
A.
documentation controls.
B.
change management controls.
C.
access management controls
D.
reconciliation controls
reconciliation controls
Page 6 out of 204 Pages |
Previous |