1.
What mechanism does a system use to compare the security labels of a subject and an object?
2.
Which of the following is the most reliable, secure means of removing data from magnetic storage media such as a magnetic tape, or a cassette?
3.
Which of the following is NOT a media viability control used to protect the viability of data storage media?
4.
An electrical device (AC or DC) which can generate coercive magnetic force for the purpose of reducing magnetic flux density to zero on storage media or other magnetic media is called:
5.
What is the most secure way to dispose of information on a CD-ROM?
6.
Which of the following refers to the data left on the media after the media has been erased?
7.
What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?
8.
Which of the following logical access exposures involvers changing data before, or as it is entered into the computer?
9.
When it comes to magnetic media sanitization, what difference can be made between clearing and purging information?
10.
Which of the following method is recommended by security professional to PERMANENTLY erase sensitive data on magnetic media?