1.
File Integrity Monitoring (FIM) is considered a________________________.
2.
What are the primary reasons for the development of a business case for a security project?
3.
John is the project manager for a large project in his organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they've already completed the project work they were contracted to do. What can John do in this instance?
4.
When updating the security strategic planning document what two items must be included?
5.
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
6.
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered______________________.
7.
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
8.
The process for identifying, collecting, and producing digital information in support of legal proceedings is called _____________________________.
9.
An anonymity network is a series of?
10.
The newly appointed CISO of an organization is reviewing the IT security strategic plan. Which of the following is the MOST important component of the strategic plan?