A incorrect routing b eavesdropping c call recording

This preview shows page 344 - 348 out of 720 pages.

A.Incorrect routingB. EavesdroppingC.Call recording
885CB989129A5F974833949052CFB2F2D.Denial of serviceCorrect Answer:BSection: Information System Operations, Maintenance and SupportExplanationExplanation/Reference:QUESTION 357An IT department has given a vendor remote access to the internal network for troubleshooting network performance problems. After discovering the remote activityduring a firewall log review, which of the following is theBESTcourse of action for an information security manager?A.Revoke the access.B.Review the related service level agreement (SLA).C.Determine the level of access granted.D.Declare a security incident.Correct Answer:CSection: Information System Operations, Maintenance and SupportExplanationExplanation/Reference:QUESTION 358An information security manager has observed multiple exceptions for a number of different security controls. Which of the following should be the informationsecurity manager’sFIRSTcourse of action?A.Design mitigating controls for the exceptions.B.Prioritize the risk and implement treatment options.C.Inform respective risk owners of the impact of exceptions.D.Report the noncompliance to the board of directors.Correct Answer:BSection: Information System Operations, Maintenance and SupportExplanationExplanation/Reference:
885CB989129A5F974833949052CFB2F2QUESTION 359TheBESTway to avoid session hijacking is to use:A.a reverse lookupB.a secure protocolC.a firewallD.strong password controlsCorrect Answer:BSection: Information System Operations, Maintenance and SupportExplanationExplanation/Reference:QUESTION 360Which of the following outsourced services has theGREATESTneed for security monitoring?A.Web site hostingB.Application developmentC.Virtual private network (VPN) servicesD.Enterprise infrastructureCorrect Answer:DSection: Information System Operations, Maintenance and SupportExplanationExplanation/Reference:QUESTION 361An organization uses two data centers. Which of the following wouldBESTaddress the organization’s need for high resiliency?A.The data centers act as mirrored sites.B.Each data center is recoverable via tape backups.C.A hot site is used for the second site.
885CB989129A5F974833949052CFB2F2D.There is data replication across the data centers.Correct Answer:ASection: Information System Operations, Maintenance and SupportExplanationExplanation/Reference:QUESTION 362Which of the following should be thePRIMARYconsideration for IT management when selecting a new information security tool that monitors suspicious fileaccess patterns?A.Integration with existing architectureB.Ease of support and troubleshootingC.Data correlation and visualization capabilitiesD.Ability to contribute to key performance indicator dataCorrect Answer:DSection: Information System Operations, Maintenance and SupportExplanationExplanation/Reference:QUESTION 363Which of the following is theMOSTcritical characteristic of a biometric system?

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 720 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture