DETAILED ANSWERS
1.How does a web of trust model provide security since it does not involve a
trusted third-party?: Through consistency of serial numbers of self-issued
certificates
2.You have been asked to help design the security awareness and training
program for your company. Which of the following statements is NOT true
regarding this program?: Specialized technical training should be provided for
executives.
3.Which of the following options describes integrity?: Preservation of internal
and external consistency
4.What component of an incident response policy clearly defines the laws
and regulations that must be followed within the organization?: Standards
Policy
5.How can organizations benefit from converged network communications?:
-Reduced number of solution vendors and protocols
6.Which of the following are security log event severity levels? (Choose all
that apply.): Debug
Notice
Alert
Warning
Critical