Final Practice Exam Flashcards
Which of the following software development processes follows a linear sequence from initiation and conception to maintenance?
- v- model
- iterative and incremental
- prototyping
- waterfall
- spiral
waterfall
Computer forensic experts work with two primary types of data. What are they?
- quantitative and qualitative
- digital and physical
- visible and latent
- mob
visible and latent
The national institute of Standards and Technologyy (Nist) released AES in what year?
- 2003
- 2002
- 2001
- 2004
2001
Information security is the umbrella term used to describe the collection of ____ and ____ employed to protect information.
- Techniques, Technologies
- Processes, Techniques
- Processes, Technologies
- Technologies, Equipment
Processes, Technologies
What is one of the major challenges of information security policies?
- They can be time-consuming.
- They can be difficult to implement.
- The administrative, regulatory and technological policies can all interact.
- They can be hard to understand.
The administrative, regulatory and technological policies can all interact.
A collection of standardized policies, procedures and guides, meant to direct a firm or any organization, which adopts its use, on how to protect its infrastructure from security breaches is called _____
- Information Security Framework
- Access Control Handbook
- Company Protection Handbook
- Security Guidelines
Information Security Framework
Which of these is considered a decreased measurable
- Increase in battery life
- Loss of battery life
- Increase in storage space
- Rooting phone
Loss of battery life
Which of the following describes a technological response to phishing attacks?
- Private Lawsuits
- FTC investigations
- User training and awareness
- Spam filters
Spam filters
The internet security threat referred to as ‘pharming’ can be described as _____.
- Denial-of-service
- Identity theft
- Hacking
- Online fraud
Online fraud
After a catastrophe, _____ disaster plan(s) are often needed to recover.
- Multiple
- Blanket
- New
- a single uniformed
multiple
AREAS of Weakness
Disaster Recovery in Cysec
Basics of Cybercrime
Policies & Procedures for Cybersecurity
Which of the following is a major function of the Facilities Team?
- Supplying needed staffing and management for standby data centers and backup libraries in order to meet user requirements
- Supervising equipment and line installations for new networks
- Arranging transportation to standby centers
- Restoring networks at standby sites and installing new voice networks for critical telephony users
Arranging transportation to standby centers
Maintaining IT disaster recovery master copies, offsite copies and plans are the responsibilities of the _____.
- Disaster Management Team
- Recovery Coordinators
- Facilities Team
- Communication Team
Recovery Coordinators
Processes and actions taken to implement the requirements in the policy documents is called _____
- Procedures
- Policy steps
- Directions
- Instructions
Procedures
What form of analysis involves running the possibly infected file?
- Virtual Analysis
- Malware Analysis
- Dynamic Analysis
- Static Analysis
Dynamic Analysis