multi test g

The flashcards below were created by user johnnystevens on FreezingBlue Flashcards.

  1. 601 A user ID, PIN, and a palm scan are all required to authenticate a system. Which of the following is this an example of?

    A. Two-factor authentication
    B. Single-factor authentication
    C. SSO
    D. Three-factor authentication
    A. Two-factor authentication
    (this multiple choice question has been scrambled)
  2. 602 Which of the following would be disabled to prevent SPIM?

    A. Instant messaging
    B. Internet mail
    C. ActiveX controls
    D. P2P
    A. Instant messaging
    (this multiple choice question has been scrambled)
  3. 603 A user sees an MD5 hash number beside a file that they wish to download. Which of the following BEST describes a hash?

    A. A hash is a unique number that is generated based upon the files contents and used as the SSL key during download
    B. A hash is a unique number that is generated based upon the TCP/IP transmission header and should be verified before download
    C. A hash is a unique number that is generated based upon the files contents and should be verified after download
    D. A hash is a unique number that is generated after the file has been encrypted and used as the SSL key during download
    C. A hash is a unique number that is generated based upon the files contents and should be verified after download
    (this multiple choice question has been scrambled)
  4. 604 According to a good disaster recovery plan, which of the following must happen during a power outage before an uninterruptible power supply (UPS) drains its battery?

    A. The PKI CA is relocated
    B. Full electrical service is restored
    C. The backup generator activates
    D. The single point of failure is remedied
    C. The backup generator activates
    (this multiple choice question has been scrambled)
  5. 605 Which of the following would give a technician the MOST information regarding an external attack on the network?

    A. NIDS
    B. Proxy server
    C. Firewall
    D. Internet content filter
    A. NIDS
    (this multiple choice question has been scrambled)
  6. 606 Which of the following would BEST prevent night shift workers from logging in with IDs and passwords stolen from the day shift workers?

    A. Domain password policy
    B. Time of day restriction
    C. Account lockout
    D. Account expiration
    B. Time of day restriction
    (this multiple choice question has been scrambled)
  7. 607 Which of the following would BEST ensure that users have complex passwords?

    A. Time of day restrictions
    B. Logical tokens
    C. ACL
    D. Domain password policy
    D. Domain password policy
    (this multiple choice question has been scrambled)
  8. 608 A technician finds that a malicious user has introduced an unidentified virus to a single file on the network. Which of the following would BEST allow for the user to be identified?

    A. Access logs
    B. Firewall logs
    C. Performance log
    D. Antivirus logs
    A. Access logs
    (this multiple choice question has been scrambled)
  9. 609 Which of the following would BEST allow an administrator to find the IP address of an external attacker?

    A. Performance logs
    B. Firewall logs
    C. DNS logs
    D. Antivirus logs
    B. Firewall logs
    (this multiple choice question has been scrambled)
  10. 610 After performing a vulnerability analysis and applying a security patch, which of the following non-intrusive actions should an administrator take to verify that the vulnerability was truly removed?

    A. Apply a security patch from the vendor
    B. Update the antivirus definition file
    C. Perform a penetration test
    D. Repeat the vulnerability scan
    D. Repeat the vulnerability scan
    (this multiple choice question has been scrambled)
  11. 611 Which of the following could be used by a technician needing to send data while ensuring that any data tampering is easily detectible?

    A. NTLM
    B. AES
    C. SHA-1
    D. LANMAN
    C. SHA-1
    (this multiple choice question has been scrambled)
  12. 612 Which of the following BEST allows for a high level of encryption?

    A. 3DES with MD5
    B. AES with ECC
    C. PGP with SHA-1
    D. DES with SHA-1
    B. AES with ECC
    (this multiple choice question has been scrambled)
  13. 613 Which of the following is the primary security risk associated with removable storage?

    A. Availability
    B. Confidentiality
    C. Injection
    D. Integrity
    B. Confidentiality
    (this multiple choice question has been scrambled)
  14. 614 After reading about the vulnerability issues with open SMTP relays, a technician runs an application to see if port 25 is open. This would be considered a:

    A. protocol analyzer
    B. vulnerability scan
    C. network mapper
    D. port scan
    D. port scan
    (this multiple choice question has been scrambled)
  15. 615 A company?s accounting application requires users to be administrators for the software to function correctly. Because of the security implications of this, a network administrator builds a user profile which allows the user to still use the application but no longer requires them to have administrator permissions.
    Which of the following is this an example of?

    A. Configuration baseline
    B. Group policy
    C. Privilege escalation
    D. Security template
    D. Security template
    (this multiple choice question has been scrambled)
  16. 616 Which of the following backup techniques resets the archive bit and allows for the fastest recovery?

    A. Differential backup
    B. Full backup
    C. Shadow copies
    D. Incremental backup
    B. Full backup
    (this multiple choice question has been scrambled)
  17. 617 The company policy for availability requires full backups on Sunday and incremental backups each week night at 10 p.m. The file server crashes on Wednesday afternoon; how many tapes will the technician need to restore the data on the file server for Thursday morning?

    A. Three
    B. One
    C. Two
    D. Four
    A. Three
    (this multiple choice question has been scrambled)
  18. 618 A company is addressing backup and recovery issues. The company is looking for a compromise between speed of backup and speed of recovery. Which of the following is the BEST recommendation?

    A. Weekly differential with incremental backups daily
    B. Full backups weekly with differential backups daily
    C. Full backups every day
    D. Daily differential backups
    B. Full backups weekly with differential backups daily
    (this multiple choice question has been scrambled)
  19. 619 Which of the following would define document destruction requirements?

    A. Storage and retention policies
    B. Group policy
    C. ACL
    D. User access and rights review policies
    A. Storage and retention policies
    (this multiple choice question has been scrambled)
  20. 620 Part of a standard policy for hardening workstations and servers should include applying the company security template and:

    A. disabling SSID broadcast
    B. closing unnecessary network ports
    C. applying all updates, patches and hotfixes immediately
    D. installing the NIDS
    B. closing unnecessary network ports
    (this multiple choice question has been scrambled)
  21. 621 Setting a baseline is required in which of the following? (Select TWO)

    A. Anomaly-based monitoring
    B. NIDS
    C. Signature-based monitoring
    D. NIPS
    E. Behavior-based monitoring
    • A. Anomaly-based monitoring
    • E. Behavior-based monitoring
  22. 622 Which of the following hidden programs gathers information with or without the users knowledge with the primary purpose of advertising?

    A. Worm
    B. Spyware
    C. Virus
    D. Trojan
    B. Spyware
    (this multiple choice question has been scrambled)
  23. 623 Which of the following provides best practice with a wireless network?

    A. WPA with RADIUS
    B. WEP 128-bit
    C. 3DES with RADIUS
    D. WPA
    A. WPA with RADIUS
    (this multiple choice question has been scrambled)
  24. 624 Which of the following sites has the means (E. g. equipment, software, and communications) to facilitate a full recovery within minutes?

    A. Warm site
    B. Reciprocal site
    C. Cold site
    D. Hot site
    D. Hot site
    (this multiple choice question has been scrambled)
  25. 625 When conducting an environmental security assessment, which of the following items should be included in the assessment? (Select THREE)

    A. HVAC
    B. Card access system
    C. Off-site data storage
    D. Logical access
    E. Utilities
    F. Fire detection
    • A. HVAC
    • E. Utilities
    • F. Fire detection
  26. 626 Which of the following security steps must a user complete before access is given to the network?

    A. Authentication and password
    B. Identification and authentication
    C. Identification and authorization
    D. Authentication and authorization
    B. Identification and authentication
    (this multiple choice question has been scrambled)
  27. 627 When placing a NIDS onto the network, the NIC has to be placed in which of the following modes to monitor all network traffic?

    A. Full-duplex
    B. Half-duplex
    C. Promiscuous
    D. Auto
    C. Promiscuous
    (this multiple choice question has been scrambled)
  28. 628 An administrator wants to obtain a view of the type of attacks that are being targeted against the network perimeter. The recommended placement of a NIDS would be:

    A. inside the proxy
    B. inside the firewall
    C. inside the DMZ
    D. outside the proxy
    E. outside the firewall
    E. outside the firewall
    (this multiple choice question has been scrambled)
  29. 629 Once a system has been compromised, often the attacker will upload various tools that can be used at a later date. The attacker could use which of the following to hide these tools?

    A. Trojan
    B. Rootkit
    C. Virus
    D. Logic bomb
    B. Rootkit
    (this multiple choice question has been scrambled)
  30. 630 Which of the following is the perfect encryption scheme and is considered unbreakable when properly used?

    A. Steganography
    B. Running key cipher
    C. Concealment cipher
    D. One-time pad
    D. One-time pad
    (this multiple choice question has been scrambled)
  31. 631 When using a digital signature, the message digest is encrypted with which of the following keys?

    A. Receivers private key
    B. Senders private key
    C. Senders public key
    D. Receivers public key
    B. Senders private key
    (this multiple choice question has been scrambled)
  32. 632 Which of the following is the MOST basic form of IDS?

    A. Statistical
    B. Anomaly
    C. Signature
    D. Behavioral
    C. Signature
    (this multiple choice question has been scrambled)
  33. 633 Which of the following BEST applies to steganography?

    A. Algorithms are not used to encrypt data
    B. Keys are used to encrypt data
    C. Keys are concealed in the data
    D. Algorithms are used to encrypt data
    A. Algorithms are not used to encrypt data
    (this multiple choice question has been scrambled)
  34. 634 Which of the following can steganography be used for?

    A. Decrypt data in graphics
    B. Encrypt data in graphics
    C. Watermark graphics for copyright
    D. Encrypt a message in WAV files
    C. Watermark graphics for copyright
    (this multiple choice question has been scrambled)
  35. 635 Steganography could be used by attackers to:

    A. hide and conceal messages in WAV files
    B. decrypt data stored in unused disk space
    C. encrypt and conceal messages in microdots
    D. encrypt and decrypt messages in graphics
    A. hide and conceal messages in WAV files
    (this multiple choice question has been scrambled)
  36. 636 Which of the following BEST describes how steganography can be accomplished in graphic files?

    A. Replacing the least significant byte of each bit
    B. Replacing the most significant byte of each bit
    C. Replacing the least significant bit of each byte
    D. Replacing the most significant bit of each byte
    C. Replacing the least significant bit of each byte
    (this multiple choice question has been scrambled)
  37. 637 An application developer is looking for an encryption algorithm which is fast and hard to break if a large key size is used. Which of the following BEST meets these requirements?

    A. Transposition
    B. Substitution
    C. Asymmetric
    D. Symmetric
    D. Symmetric
    (this multiple choice question has been scrambled)
  38. 638 Which of the following if used incorrectly would be susceptible to frequency analysis?

    A. Symmetric algorithms
    B. Transposition ciphers
    C. Stream ciphers
    D. Asymmetric algorithms
    B. Transposition ciphers
    (this multiple choice question has been scrambled)
  39. 639 An administrator in an organization with 33,000 users would like to store six months of Internet proxy logs on a dedicated logging server for analysis and content reporting. The reports are not time critical, but are required by upper management for legal obligations. All of the following apply when determining the requirements for the logging server EXCEPT:

    A. performance baseline and audit trails
    B. time stamping and integrity of the logs
    C. log storage and backup requirements
    D. log details and level of verbose logging
    A. performance baseline and audit trails
    (this multiple choice question has been scrambled)
  40. 640 Which of the following BEST describes when a hashing algorithm generates the same hash for two different messages?

    A. A one-way hash occurred
    B. A collision occurred
    C. A hashing chain occurred
    D. A deviation occurred
    B. A collision occurred
    (this multiple choice question has been scrambled)
  41. 641 Which of the following is BEST known for self-replication in networks?

    A. Worm
    B. Spyware
    C. Spam
    D. Adware
    A. Worm
    (this multiple choice question has been scrambled)
  42. 642 Which of the following security threats affects PCs and can have its software updated remotely by a command and control center?

    A. Adware
    B. Virus
    C. Zombie
    D. Worm
    C. Zombie
    (this multiple choice question has been scrambled)
  43. 643 Multiple web servers are fed from a load balancer. Which of the following is this an example of?

    A. Redundant servers
    B. Hot site
    C. Backup generator
    D. RAID
    A. Redundant servers
    (this multiple choice question has been scrambled)
  44. 644 An outside auditor has been contracted to determine if weak passwords are being used on the network.

    To do this, the auditor is running a password cracker against the master password file. Which of the following is this an example of?

    A. Vulnerability assessment
    B. Malware scan
    C. Baselining
    D. Fingerprinting
    A. Vulnerability assessment
    (this multiple choice question has been scrambled)
  45. 645 Password crackers:

    A. cannot exploit weaknesses in encryption algorithms
    B. are sometimes able to crack both Windows and UNIX passwords
    C. are sometimes able to crack both passwords and physical tokens
    D. cannot be run remotely
    B. are sometimes able to crack both Windows and UNIX passwords
    (this multiple choice question has been scrambled)
  46. 646 Logic bombs differ from worms in that:

    A. logic bombs cannot be sent through email
    B. logic bombs always contain a Trojan component
    C. logic bombs cannot spread from computer to computer
    D. logic bombs always have a date or time component
    D. logic bombs always have a date or time component
    (this multiple choice question has been scrambled)
  47. 647 A firewall differs from a NIDS in which of the following ways?

    A. A firewall prevents inside attacks and a NIDS prevents outside attacks
    B. A firewall operates on a rule list and a NIDS attempts to detect patterns
    C. A firewall attempts to detect patterns and a NIDS operates on a rule list
    D. A firewall prevents outside attacks and a NIDS prevents inside attacks
    B. A firewall operates on a rule list and a NIDS attempts to detect patterns
    (this multiple choice question has been scrambled)
  48. 648 A vulnerability has recently been identified for a servers OS. Which of the following describes the BEST course of action?

    A. Visit a search engine and search for a possible patch
    B. Visit the operating system manufacturer?s website for a possible patch
    C. Shutdown all affected servers until management can be notified
    D. Wait for an automatic update to be pushed out to the server from the manufacturer
    B. Visit the operating system manufacturer?s website for a possible patch
    (this multiple choice question has been scrambled)
  49. 649 Personal software firewalls can be updated automatically using:

    A. cross-site scripting
    B. group policy
    C. corporate hardware firewalls
    D. cookies
    B. group policy
    (this multiple choice question has been scrambled)
  50. 650 An accountant has logged onto the company?s external banking website. An administrator using a TCP/IP monitoring tool discovers that the accountant was actually using a spoofed banking website. Which of the following could have caused this attack? (Select TWO)

    A. Altered hosts file
    B. Network mapper
    C. Packet sniffing
    D. DNS poisoning
    E. Bluesnarfing
    • A. Altered hosts file
    • D. DNS poisoning
  51. 651 Which of the following tools would be BEST for monitoring changes to the approved system baseline?

    A. Enterprise key management software
    B. Enterprise performance monitoring software
    C. Enterprise resource planning software
    D. Enterprise antivirus software
    B. Enterprise performance monitoring software
    (this multiple choice question has been scrambled)
  52. 652 All of the following security applications can proactively detect workstation anomalies EXCEPT:

    A. HIPS
    B. NIDS
    C. personal software firewall
    D. antivirus software
    B. NIDS
    (this multiple choice question has been scrambled)
  53. 653 A periodic security audit of group policy can:

    A. show that virus definitions are up to date on all workstations
    B. show that unnecessary services are blocked on workstations
    C. show that PII data is being properly protected
    D. show that data is being correctly backed up
    B. show that unnecessary services are blocked on workstations
    (this multiple choice question has been scrambled)
  54. 654 Which of the following is the primary purpose of an audit trail?

    A. To detect the encryption algorithm used for files
    B. To detect when a user changes security permissions
    C. To prevent a user from changing security settings
    D. To prevent a user from changing security permissions
    B. To detect when a user changes security permissions
    (this multiple choice question has been scrambled)
  55. 655 Which of the following describes a characteristic of the session key in an SSL connection?

    A. It is an elliptical curve
    B. It is symmetric
    C. It is asymmetric
    D. It is a hash value
    B. It is symmetric
    (this multiple choice question has been scrambled)
  56. 656 Which of the following describes the cryptographic algorithm employed by TLS to establish a session key?

    A. Diffie-Hellman
    B. IKE
    C. Blowfish
    D. RSA
    A. Diffie-Hellman
    (this multiple choice question has been scrambled)
  57. 657 Which of the following describes how TLS protects against man-in-the-middle attacks?

    A. The client relies on the MAC value sent by the server
    B. The client compares the server certificate with the certificate listed on the CRL
    C. The client compares the actual DNS name of the server to the DNS name on the certificate
    D. The client relies on the MD5 value sent by the server
    C. The client compares the actual DNS name of the server to the DNS name on the certificate
    (this multiple choice question has been scrambled)
  58. 658 Which of the following is the primary purpose of removing audit logs from a server?

    A. To demonstrate least privilege to management
    B. To reduce network latency
    C. To protect against the log file being changed
    D. To improve the server performance
    C. To protect against the log file being changed
    (this multiple choice question has been scrambled)
  59. 659 Which of the following describes a common problem encountered when conducting audit log reviews?

    A. The audit logs cannot be imported into a spreadsheet
    B. The timestamp for the servers are not synchronized
    C. The audit logs are pulled from servers on different days
    D. The servers are not synchronized with the clients
    B. The timestamp for the servers are not synchronized
    (this multiple choice question has been scrambled)
  60. 660 A technician is conducting a web server audit and discovers that SSLv2 is implemented. The technician wants to recommend that the organization consider using TLS. Which of the following reasons could the technician use to support the recommendation?

    A. SSLv2 reduces server performance
    B. SSLv2 is susceptible to network sniffing
    C. SSLv2 is susceptible to man-in-the-middle attacks
    D. SSLv2 only uses message authentication code values
    C. SSLv2 is susceptible to man-in-the-middle attacks
    (this multiple choice question has been scrambled)
  61. 661 A technician is conducting a password audit using a password cracking tool. Which of the following describes a BEST business practice when conducting a password audit?

    A. Use hybrid mode
    B. Use password masking
    C. Reveal the password
    D. Single out the accounts to crack
    B. Use password masking
    (this multiple choice question has been scrambled)
  62. 662 Which of the following is a security risk when using peer-to-peer software?

    A. Licensing
    B. Cookies
    C. Data leakage
    D. Multiple streams
    C. Data leakage
    (this multiple choice question has been scrambled)
  63. 663 Which of the following overwrites the return address within a program to execute malicious code?

    A. Buffer overflow
    B. Logic bomb
    C. Rootkit
    D. Privilege escalation
    A. Buffer overflow
    (this multiple choice question has been scrambled)
  64. 664 Heaps and stacks are susceptible to which of the following?

    A. Cross-site scripting
    B. Buffer overflows
    C. Rootkits
    D. SQL injection
    B. Buffer overflows
    (this multiple choice question has been scrambled)
  65. 665 All of the following are inline devices EXCEPT:

    A. NIPS
    B. HIDS
    C. firewalls
    D. routers
    B. HIDS
    (this multiple choice question has been scrambled)
  66. 666 Which of the following would a technician use to validate whether specific network traffic is indeed an attack?

    A. NIDS
    B. Firewall
    C. Honeypot
    D. Protocol analyzer
    D. Protocol analyzer
    (this multiple choice question has been scrambled)
  67. 667 Which of the following creates an emulated or virtual environment to detect and monitor malicious activity?

    A. Firewall
    B. NAC
    C. NIDS
    D. Honeypot
    D. Honeypot
    (this multiple choice question has been scrambled)
  68. 668 A technician wants better insight into the websites that employees are visiting. Which of the following is BEST suited to accomplish this?

    A. Firewall
    B. DNS server
    C. DHCP server
    D. Proxy server
    D. Proxy server
    (this multiple choice question has been scrambled)
  69. 669 Bluetooth discover mode is similar to which of the following?

    A. RF analysis
    B. SSID broadcast
    C. Data emanation
    D. Fuzzing
    B. SSID broadcast
    (this multiple choice question has been scrambled)
  70. 670 All of the following are Bluetooth threats EXCEPT:

    A. discovery mode
    B. bluesnarfing
    C. blue jacking
    D. a smurf attack
    D. a smurf attack
    (this multiple choice question has been scrambled)
  71. 671 Which of the following is the BEST approach when reducing firewall logs?

    A. Review chronologically
    B. Discard known traffic first
    C. Review each protocol one at a time
    D. Search for encrypted protocol usage
    B. Discard known traffic first
    (this multiple choice question has been scrambled)
  72. 672 In which of the following logs would notation of a quarantined file appear?

    A. Router
    B. Firewall
    C. Antivirus
    D. NAC
    C. Antivirus
    (this multiple choice question has been scrambled)
  73. 673 Which of the following provides the MOST mathematically secure encryption for a file?

    A. Elliptic curve
    B. AES256
    C. One-time pad
    D. 3DES
    B. AES256
    (this multiple choice question has been scrambled)
  74. 674 Which of the following encryption algorithms relies on the inability to factor large prime numbers?

    A. Elliptic Curve
    B. SHA-1
    C. AES256
    D. RSA
    D. RSA
    (this multiple choice question has been scrambled)
  75. 675 All of the following provide a host active protection EXCEPT:

    A. HIPS
    B. antivirus
    C. host-based firewall
    D. HIDS
    D. HIDS
    (this multiple choice question has been scrambled)
  76. 676 Which of the following simplifies user and computer security administration?

    A. Encrypted file system (EFS)
    B. Printing policies
    C. Directory services
    D. Data retention
    C. Directory services
    (this multiple choice question has been scrambled)
  77. 677 Which of the following is MOST likely to cause pop-ups?

    A. Spam
    B. Botnets
    C. Adware
    D. Rootkit
    C. Adware
    (this multiple choice question has been scrambled)
  78. 678 Which of the following is MOST likely to open a backdoor on a system?

    A. Logic bomb
    B. Botnet
    C. Worm
    D. Trojan
    D. Trojan
    (this multiple choice question has been scrambled)
  79. 679 If a company has a distributed IT staff, each being responsible for separate facilities, which of the following would be the BEST way to structure a directory information tree?

    A. By department
    B. By name
    C. By role
    D. By location
    D. By location
    (this multiple choice question has been scrambled)
  80. 680 A technician wants to be able to add new users to a few key groups by default, which of the following would allow this?

    A. Inheritance
    B. Auto-population
    C. Default ACL
    D. Template
    D. Template
    (this multiple choice question has been scrambled)
  81. 681 Which of the following is a reason to use digital signatures?

    A. Non-repudiation
    B. Hardware token
    C. Logical token
    D. Access control list
    A. Non-repudiation
    (this multiple choice question has been scrambled)
  82. 682 All of the following are logical access control methods EXCEPT:

    A. group policy
    B. software token
    C. ACL
    D. biometrics
    D. biometrics
    (this multiple choice question has been scrambled)
  83. 683 Using the same initial computer image for all systems is similar to which of the following?

    A. Virtual machine
    B. Group policy
    C. Patch management
    D. Configuration baseline
    D. Configuration baseline
    (this multiple choice question has been scrambled)
  84. 684

    Which of the following has the LEAST amount of issues when inspecting encrypted traffic?

    A. NIPS
    B. Antivirus
    C. Firewall
    D. NIDS
    B. Antivirus
    (this multiple choice question has been scrambled)
  85. 685 A technician has come across content on a server that is illegal. Which of the following should the technician do?

    A. Stop and immediately copy the system files and contact the ISP
    B. Stop and immediately follow company approved incident response procedures
    C. Stop and immediately make a backup of the account and contact the owner of the data
    D. Stop and immediately perform a full system backup and contact the owner of the data
    B. Stop and immediately follow company approved incident response procedures
    (this multiple choice question has been scrambled)
  86. 686 Which of the following is a true statement in regards to incident response?

    A. If a technician finds illegal content, the first thing a technician should do is unplug the machine and back it up
    B. The first thing a technician should do is call in law enforcement
    C. If a technician finds illegal content, they should follow company incident response procedures
    D. The first thing a technician should perform is a file system backup
    C. If a technician finds illegal content, they should follow company incident response procedures
    (this multiple choice question has been scrambled)
  87. 687 If a technician is unable to get to a website by its address but the technician can get there by the IP address, which of the following is MOST likely the issue?

    A. DNS server
    B. DHCP server
    C. Proxy server
    D. Firewall
    A. DNS server
    (this multiple choice question has been scrambled)
  88. 688 Which of the following is placed in promiscuous mode, in line with the data flow, to allow a NIDS to monitor the traffic?

    A. Sensor
    B. Filter
    C. Appliance
    D. Console
    A. Sensor
    (this multiple choice question has been scrambled)
  89. 689 In a NIDS, which of the following provides a user interface?

    A. Screen
    B. Filter
    C. Console
    D. Appliance
    C. Console
    (this multiple choice question has been scrambled)
  90. 690 An instance where an IDS identifies legitimate traffic as malicious activity is called which of the following?

    A. True negative
    B. True positive
    C. False positive
    D. False negative
    C. False positive
    (this multiple choice question has been scrambled)
  91. 691 An instance where a biometric system identifies legitimate users as being unauthorized is called which of the following?

    A. False negative
    B. False positive
    C. False rejection
    D. False acceptance
    C. False rejection
    (this multiple choice question has been scrambled)
  92. 692 An instance where a biometric system identifies users that are authorized and allows them access is called which of the following?

    A. True negative
    B. False positive
    C. True positive
    D. False negative
    C. True positive
    (this multiple choice question has been scrambled)
  93. 693 An instance where an IDS identifies malicious activity as being legitimate activity is called which of the following?

    A. False positive
    B. False negative
    C. False acceptance
    D. False rejection
    B. False negative
    (this multiple choice question has been scrambled)
  94. 694 An instance where a biometric system identifies unauthorized users and allows them access is called:

    A. false negative
    B. false positive
    C. false acceptance
    D. false rejection
    C. false acceptance
    (this multiple choice question has been scrambled)
  95. 695 When executing a disaster recovery plan the MOST important thing to consider is:

    A. data backups and recovery tapes
    B. safety and welfare of personnel
    C. legal and financial responsibilities
    D. financial obligations to stockholders
    B. safety and welfare of personnel
    (this multiple choice question has been scrambled)
  96. 696 When choosing a disaster recovery site, which of the following is the MOST important consideration?

    A. The amount of emergency rescue personnel
    B. The cost to rebuild the existing facility
    C. The amount of data that will be stored
    D. The distance and size of the facility
    D. The distance and size of the facility
    (this multiple choice question has been scrambled)
  97. 697 Who should be notified FIRST before testing the disaster recovery plan?

    A. The physical security department
    B. All employees and key staff
    C. Human resources
    D. Senior management
    D. Senior management
    (this multiple choice question has been scrambled)
  98. 698 Which of the following BEST describes the disaster recovery plan?

    A. A plan that is mandated by law to ensure liability issues are addressed in a catastrophic event
    B. A detailed process of recovering information or IT systems after a catastrophic event
    C. An emergency plan that will allow the company to recover financially
    D. A plan that is put in place to recover the company assets in an emergency
    B. A detailed process of recovering information or IT systems after a catastrophic event
    (this multiple choice question has been scrambled)
  99. 699 Which of the following is the MOST important consideration when developing a disaster recovery plan?

    A. Management buy-in
    B. The cost of the project
    C. The amount of personnel
    D. The planning team
    A. Management buy-in
    (this multiple choice question has been scrambled)
  100. 700 In order to provide management with a prioritized list of time critical business processes, an administrator would assist in conducting a:

    A. disaster recovery plan
    B. continuity of operations plan
    C. business impact assessment
    D. risk management matrix
    C. business impact assessment
    (this multiple choice question has been scrambled)
Author:
johnnystevens
ID:
10953
Card Set:
multi test g
Updated:
2010-03-17 17:01:18
Tags:
testing
Folders:

Description:
multiple choice upload test
Show Answers: