OPERATIONS EXAM TEST QUESTIONS AND
ANSWERS VERIFIED 100% CORRECT
The agile process emphasizes which of the following over processes and
tools? - ANSWER- Individuals and Interactions
Jurisdiction and Breach Notification are examples of what type of
potential risk? - ANSWER- Legal
Which of the following is considered the necessary research done before
launching a scan? - ANSWER- Network Reconnaissance
Cloud computing does NOT require a constant Internet connection. -
ANSWER- False
Which of the following should be developed during the SDLC? -
ANSWER- All of the Above
HTML5 is the latest version of the markup language. - ANSWER- True
Chain of Custody shows who controlled, secured and obtained a piece of
evidence. - ANSWER- True
There should never be different levels of regulations within a single
business unit. - ANSWER- False
New zero day attacks are being discovered on a regular basis against a
broad range of IT systems. Which of the following best practices should
, a security manager do to manage the risks being faced through these
attack vectors? - ANSWER- Maintain a list of critical systems.
Which of the following BEST explains SAML? - ANSWER- A security
attestation model built on XML and SOAP based services, which allows
for the exchange of AandA data between systems and supports
Federated Identity Management.
An intrusion detection system logged an attack attempt from a remote IP
address. One week later, the attacker successfully compromised the
network. Which of the following MOST likely occurred? - ANSWER-
No one was reviewing the IDS event logs.
A government agency has a major new initiative to virtualize as many
servers as possible, due to power and rack space capacity at its two data
centers. The agency has prioritized virtualizing older servers first as the
hardware is nearing end of life. The two initial migrations include
Windows 2000 hosts (domain controllers and front-facing web servers)
and open source Linux hosts (front facing web servers). Which of the
following should occur based on best practices? - ANSWER- Each data
center should contain separate virtual environments for the web servers
and for the domain controllers.
Which of the following is an agreement between two or more
organizations to work together to allow information exchange? -
ANSWER- Interoperability
The DoD has specific mandatory requirements for data encryption. -
ANSWER- True
A new IDS appliance is generating a very large number of events, most
of which are not security-related. Select the approach which best
resolves this issue. - ANSWER- Adjust IDS filters that are creating false