1.
Which of the following is NOT an auditing function that should be performed regularly?
2.
Which TWO of the following items should be accomplished, when interviewing candidates for a position within an organization?
3.
A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protect sensitive, but unclassified, information. What is the name of this Standard?
4.
Which of the following is likely in a small-business environment?
5.
Organizations____________ risk, when they convince another entity to assume the risk for them.
6.
Which of the following best describes an external intrusion attempt on a local-area network (LAN)?
7.
_________ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.
8.
If a firewall receives traffic not explicitly permitted by its security policy, what should the firewall do?
9.
Digital signatures are typically provided by a _______, where a third party verifies a key's authenticity.
10.
Which type of access management uses information about job duties and positions, to indicate subjects' clearance levels?