Technicians UPDATED Exam Questions and
CORRECT Answers
In order to automate host characteristic monitoring you can compare baselines and snapshots
with syslog. - CORRECT ANSWER - False
The following should be taken into account when accepting the residual risk inherent in the
project. - CORRECT ANSWER - All of the above
What is the high water mark for an information system? - CORRECT ANSWER - Highest
Potential Impact value assigned to each Security Objective (AIC) for all Security Categories
resident on the system and the overall classification of the system.
Which of the following describes NetScan Tools Pro? - CORRECT ANSWER - D. A
collection of Internet information gathering and network troubleshooting utilities
FIPS 200 is: - CORRECT ANSWER - A short document that describes the minimum
security requirements for information and information systems
Which risk comes from a failure of the controls to properly mitigate risk? - CORRECT
ANSWER - C. Control Risk
Open Source Security (OSSEC) is what? - CORRECT ANSWER - A host based security
system that monitors for changes
What tool would be best to automatically detect your network and construct a complete and easy
to view network map? - CORRECT ANSWER - LANsurveyor