of the following is the primary security feature of a proxy server?
A、Client hiding
B、URL blocking
C、Route blocking
D、Content filtering
What is the most effective means of determining how controls are functioning within an operating system?
A、Interview with computer operator
B、Review of software control features and/or parameters
C、Review of operating system manual
D、Interview with product vendor
The ability to do something with a computer resource can be explicitly enabled or restricted through:
A、Physical and system-based controls.
B、Theoretical and system-based controls.
C、Mental and system-based controls.
D、Physical and trap-based controls.
The following are fire detector types EXCEPT:
A、smoke activated
B、flame actuated
C、acoustical-seismic detection system
D、heat activated
A firewall can be classified as a:
A、Directory based access control.
B、Rule based access control.
C、Lattice based access control.
D、ID based access control.
If the computer system being used contains confidential information, users must not:
A、Leave their computer without first logging off.
B、Share their desks.
C、Encrypt their passwords.
D、Communicate
Which one of the following CANNOT be prevented by the Secure Shell (SSH) program?
A、Internet Protocol (IP) spoofing.
B、Data manipulation during transmissions.
C、Network based birthday attack.
D、Compromise of the source/destination host.
Which of the following OSI layers does not provide confidentiality?
A、Presentation
B、Network
C、Transport
D、Session
Virtual Private Network software typically encrypts all of the following EXCEPT
A、File transfer protocol
B、Data link messaging
C、HTTP protocol
D、Session information
Which of the following steps should be performed first in a business impact analysis (BIA)?
A、Identify all business units within an organization
B、Evaluate the impact of disruptive events
C、Estimate the Recovery Time Objectives (RTO)
D、Evaluate the criticality of business functions