96%(398)381 out of 398 people found this document helpful
This preview shows page 7 - 11 out of 15 pages.
Selected Answer:Every device configuration requires a specific procedure, so there needs to be a related procedure document.
Correct Answer:Because many configuration processes reuse the same procedure, there does not need to be a new procedure document for every configuration.Question 262 out of 2 pointsAn important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense indepth. Which of the following is notan example of a layer of security?Selected Answer:a control standardCorrect Answer:a control standardQuestion 272 out of 2 pointsBaseline LAN standards are concerned with network traffic monitoring because no matter how good firewalls and routers can be, they are still not 100% effective. Thus, _________________ offer a wide range of protection because they seek out patterns of attack.Selected Answer:intrusion systemsCorrect Answer:intrusion systemsQuestion 280 out of 2 pointsIn general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ____________________ explains the familyof controls needed to secure the connection from the internal network to the WAN router, whereas the ______________________ identifies which controls are vital for use of Web services provided by suppliers and external partnerships.Selected Answer:WAN router security standard, Domain Name SystemCorrect Answer:WAN router security standard, Web services standard
Question 290 out of 2 pointsWhich of the following control standards in the system/application domain maintains control of both managing errors and ensuring against potentially damaging code?Selected Answer:authenticationCorrect Answer:developer-related standardsQuestion 300 out of 2 pointsIn order to form an IRT, an organization is required to create a charter; thisdocument identifies the authority, mission, and goals of a committee or team, and there are a number of different types of IRT models for doing this. Which of the following models permits an IRT to have the complete authority to ensure a breach is contained?Selected Answer:IRT that acts in a coordination roleCorrect Answer:IRT that provides on-site responseQuestion 310 out of 2 pointsAn organization’s _______________________ is a particular group of differentlyskilled individuals who are responsible for attending to serious security situations.Selected Answer:disaster recovery plan team (DRPT)Correct Answer:incident response team (IRT)Question 322 out of 2 pointsThere are particular tools and techniques that the IRT utilizes to gather forensic evidence, including ____________________, which articulates the manner used to document and protect evidence.Selected Answer:chain of custody
Correct Answer:chain of custodyQuestion 332 out of 2 pointsWhile the amount of data known as mission-criticaldepends on the organization and industry, such data should only represent less than ____________ percent of the data population.