QUESTIONS WITH ACCURATE
ANSWERS
A business continuity plan (BCP) is not complete unless it includes:
A. Dedicated resources
B. Detailed procedures
C. Network diagrams
D. Critical processes correct answer B. Detailed procedures
A cyber security architecture designed around the concept of a perimeter is said
to be:
A. Data-centric
B. User-centric
C. Integrated
D. System-centric correct answer D. System-centric
A firewall that tracks open connection- oriented protocol sessions is set to be:
A. State- sponsored
B. Stateless
C. Stateful
D. Stated correct answer C. Stateful
, A passive network hub operates at which layer of the OSI model?
A. Data link
B. Physical
C. Network
D. Transport correct answer B. Physical
A risk assessment should be performed:
A. At the start of a program
B. On a regular basis
C. When an asset changes
D. When a vulnerability is discovered correct answer B. On a regular basis
A segmented network:
A. Offers defense in depth superior to a concentric-layers model
B. Consists of two or more security zones
C. Maximizes the delay experienced by an attacker
D. Delivers superior performance for internal applications correct answer B.
Consists of two or more security zones
An interoperability error is what type of vulnerability?
A. Technical