Topic 9: Exam Set A
An advantage of link encryption in a communications network is that it
A.
makes key management and distribution easier.
B.
protects data from start to finish through the entire network.
C.
improves the efficiency of the transmission.
D.
encrypts all information, including headers and routing information
encrypts all information, including headers and routing information
Which of the following is the MAIN reason that system re-certification and re-accreditation are needed?
A.
To assist data owners in making future sensitivity and criticality determinations
B.
To assure the software development team that all security issues have been addressed
C.
To verify that security protection remains acceptable to the organizational security policy
D.
To help the security team accept or reject new systems for implementation and
production
To verify that security protection remains acceptable to the organizational security policy
Which of the following is the best practice for testing a Business Continuity Plan (BCP)?
A.
Test before the IT Audit
B.
Test when environment changes
C.
Test after installation of security patches
D.
Test after implementation of system patches
Test when environment changes
The stringency of an Information Technology (IT) security assessment will be determined by the
A.
system's past security record.
B.
size of the system's database.
C.
sensitivity of the system's datA.
D.
age of the system.
sensitivity of the system's datA.
When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include
A.
hardened building construction with consideration of seismic factors.
B.
adequate distance from and lack of access to adjacent buildings.
C.
curved roads approaching the data center.
D.
proximity to high crime areas of the city.
proximity to high crime areas of the city.
Page 14 out of 298 Pages |
Previous |