CMIT 425 FINAL EXAMS QUESTIONS - Question 41(1 point Which of the following is the most commonly used physical security control Question 41 options

CMIT 425 FINAL EXAMS QUESTIONS - Question 41(1 point Which...

This preview shows page 1 - 8 out of 33 pages.

Question 41 (1 point) Which of the following is the most commonly used physical security control? Question 41 options: Fences Door Locks CCTV Security guards Save Question 42 (1 point) Which risk handling method defines the acceptable risk level the organization can tolerate and reduces the risk to that level? Question 42 options: Risk avoidance Risk transfer Risk mitigation Risk acceptance
Image of page 1
Save Question 43 (1 point) What is the level of risk an organization is willing to accept? Question 43 options: Baseline Minimum configuration Acceptable risk Risk appetite Save Question 44 (1 point) An ______________ is a methodical approach to standardize requirement discovery, design, development, testing, and implementation in every phase of a system. ___________ is the technical testing of a system. _________________ is the formal authorization given by management to allow a system to operate in a specific environment. Fill in the blanks. Question 44 options: Accreditation, Certification, SDLC Certification, SDLC, Accreditation SDLC, Accreditation, Certification SDLC, Certification, Accreditation
Image of page 2
Save Question 45 (1 point) A TCP 3-way handshake does not include the following state. Question 45 options: SYN ACK RST SYN-ACK Save Question 46 (1 point) The FISMA of 2002 requires every federal agency to create, document, and implement an agency wide security program to provide protection for the information and information systems that support the operations and assets of the agency. Which one does not necessarily require agency to comply with? Question 46 options: Inventory of information system Security control Supporting third party SLAs
Image of page 3
Risk assessment Save Question 47 (1 point) What type of network device is responsible for determining the best route from the source to the destination? Question 47 options: Switch Repeater Bridge Router Save Question 48 (1 point) Which of the following security measures is managed by File Hashing Algorithm? Question 48 options: Integrity Encryption
Image of page 4
Confidentiality Authentication Authorization Save Question 49 (1 point) ________________ refers to software that allows for the automated development of software, which can come in the form of program editors, debuggers, code analyzers, version control mechanisms, and more. Question 49 options: Privacy impact rating CASE Attack surface analysis Threat modeling Save Question 50 (1 point)
Image of page 5
Data _________________ is upheld when the assurance of the accuracy and reliability of information and systems is provided, and any unauthorized modification is prevented. Fill in the blank. Question 50 options: Availability Integrity Confidentiality Authentication Save Question 51 (1 point) A socket is established with ___________ and _______________. Question 51 options: TCP and UDP TCP and IP IP and Port Port and UDP
Image of page 6
Save Question 52 (1 point) Specific state changes take place with specific types of attacks. If an attacker will carry out a remote buffer overflow, the following state will change. Which one of the state is incorrect?
Image of page 7
Image of page 8

You've reached the end of your free preview.

Want to read all 33 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes