A(n) _______________ is an unintended communication path that can be used to violate a system security policy.
You are a system administrator managing a pool of database servers. Your software vendor releases a service pack, with many new features. What should you do? (Choose TWO.)
The items listed below are examples of ___________________ controls.
*Smart cards
*Access control lists
*Authentication servers
*Auditing
_______ is the process of confirming that implemented security safeguards work as expected.
If a firewall receives traffic not explicitly permitted by its security policy, what should the firewall do?
At ABC Corporation, access to critical information resources, such as database and e-mail servers, is controlled by the information-technology (IT) department. The supervisor in the department grants access to printers where the printer is located. Managers grant and revoke rights to files within their departments' directories on the file server, but the IT department controls who has access to the directories. Which type of access-management system is in use at ABC Corporation?
All of the following are possible configurations for a corporate intranet, EXCEPT:
____________________ educate(s) security administrators and end users about organizations' security policies.
Which of the following is NOT a restriction, for partners accessing internal corporate resources through an extranet?
Which of the following tests provides testing teams some information about hosts or networks?
You are a system administrator for a pool of Web servers. The vendor who sells your Web server posts a patch and sample exploit for a newly discovered vulnerability. You will take all of the actions listed below. Which of the following actions should you take first?
Organizations _______ risk, when they convince another entity to assume the risk for them.
If e-mail is subject to review by individuals other than the sender and recipient, what should be clearly stated in the organization's e-mail policy?
When attempting to identify OPSEC indicators, information-security professionals must: (Choose THREE.)
Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)
Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?
Which type of access management allows subjects to control some access of objects for other subjects?
Which type of Business Continuity Plan (BCP) test involves shutting down a primary site, bringing an alternate site on-line, and moving all operations to the alternate site?
Which of the following statements about the maintenance and review of information security policies is NOT true?