1.
ABC Corporation's network requires users to authenticate to cross the border firewall, and before entering restricted segments. Servers containing sensitive information require separate authentication. This is an example of which type of access-control method?
2.
Which of the following is NOT a Business Continuity Plan (BCP) recovery strategy?
3.
A(n) __________ occurs when intrusion-detection measures fail to recognize suspicious traffic or activity.
4.
All of the following are possible configurations for a corporate intranet, EXCEPT:
5.
Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Access-control systems and methodologies:
6.
Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?
7.
Maintenance of the Business Continuity Plan (BCP) must be integrated with________an organization's process.
8.
A _____________ attack uses multiple systems to launch a coordinated attack.
9.
You are considering purchasing a VPN solution to protect your organization's information assets. The solution you are reviewing uses RFC-compliant and open-standards encryption schemes. The vendor has submitted the system to a variety of recognized testing authorities. The vendor does not make the source code available to testing authorities. Does this solution adhere to the secure design principle of open design?
10.
To comply with the secure design principle of fail-safe defaults, what must a system do if it receives an instruction it does not understand? The system should: