Exam Questions and CORRECT Answers
To which of the following layers of the open systems interconnect model would one map
Ethernet?
A. Datalink
B. Network
C. Application
D. Transport - CORRECT ANSWER A. Datalink
Which of the following interpret requirements and apply them to specific situations?
A. Policies
B. Standards
C. Guidelines
D. Procedures - CORRECT ANSWER B. Standards
Business continuity plans (BCPs) associated with organizational information systems should be
developed primarily on the basis of:
A. Available resources
B. Levels of effort
C. Projected costs
D. Business needs - CORRECT ANSWER D. Business needs
A segmented network:
A. Offers defense in depth superior to a concentric-layers model
B. Consists of two or more security zones
, C. Maximizes the delay experienced by an attacker
D. Delivers superior performance for internal applications - CORRECT ANSWER B.
Consists of two or more security zones
Which of the following offers the strongest protection for wireless network traffic?
A. Wireless Protected Access 2 (WPA2)
B. Wireless Protected Access - Advanced Encryption Standard (WPA-AES)
C. Wired Equivalent Protection 128-bit (WEP-128)
D. Wireless Protected Access - Temporary Key Integrity Protocol (WPA-TKIP) - CORRECT
ANSWER A. Wireless Protected Access 2 (WPA2)
Outsourcing poses the greatest risk to an organization when it involves:
A. Business support services
B. Technology infrastructure
C. Cyber security capabilities
D. Core business functions - CORRECT ANSWER D. Core business functions
A risk assessment should be performed:
A. At the start of a program
B. On a regular basis
C. When an asset changes
D. When a vulnerability is discovered - CORRECT ANSWER B. On a regular basis
Maintaining a high degree of confidence regarding the integrity of evidence requires a(n):
A. Power of attorney