1.
Which of the following acts related to information security in the US establish that the management of an organization is responsible for establishing and maintaining an adequate internal control structure and procedures for financial reporting?
2.
Identify the data security measure which defines a principle or state that ensures that an action or transaction cannot be denied.
3.
One of the steps in information gathering is to run searches on a company using complex keywords in Google. Which search keywords would you use in the Google search engine to find all the PowerPoint presentations containing information about a target company, ROCHESTON?
4.
Which type of security policy applies to the below configuration?
i)Provides maximum security while allowing known, but necessary, dangers
ii)All services are blocked; nothing is allowed
iii)Safe and necessary services are enabled individually
iv)Non-essential services and procedures that cannot be made safe are NOT allowed
v)Everything is logged
5.
You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using Idp.exe. What are you trying to accomplish here?