Availability Management allows organizations to sustain the IT service availability to support the business
at a justifiable cost. Which of the following elements of Availability Management is used to perform at an
agreed level over a period of time?
Each correct answer represents a part of the solution. Choose all that apply.
A. Maintainability
B. Resilience
C. Error control
D. Recoverability
E. Reliability
F. Security
G. Serviceability
According to the case study, what protocol should be used to protect a customer's privacy and credit card
information?
(Click the Exhibit button on the toolbar to see the case study.)
A. L2TP
B. FTP
C. HTTP
D. MS-CHAP
E. HTTPS
F. PPTP
You switch on your mobile Bluetooth device to transfer data to another Bluetooth device. Which of the following Information assurance pillars ensures that the data transfer is being performed with the targeted authorized Bluetooth device and not with any other or unauthorized device?
A. Data integrity
B. Confidentiality
C. Authentication
D. Non-repudiation
You work as an executive manager for Mariotx.Inc. You entered into a business contract with a firm called Helfixnet.Inc. You passed on the contract details to Helfixnet.Inc and also got an acceptance approval. You later find that Helfixnet.Inc is violating the rules of the contract and they claim that they had never entered into any contract with Mariotx.Inc when asked. Which of the following directives of Information Assurance can you apply to ensure prevention from such issues?
A. Confidentiality
B. Non-repudiation
C. Data integrity
D. Data availability
Key Distribution Center is used in which authentication method?
A. Multi-factor
B. Smart cards
C. Biometrics
D. Security tokens
E. Kerberos
F. Challenge Handshake Authentication Protocol
You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?
A. Antivirus software is running on the computer.
B. You have provided an improper product key.
C. The computer is running a driver that is incompatible with Vista.
D. The computer has a hardware device that is incompatible with Vista.
Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?
A. Availability
B. Integrity
C. Confidentiality
D. Authenticity
Which of the following is an information gathering technique that is used to identify risks?
A. Diagramming technique
B. Assumption analysis
C. Checklist analysis
D. Delphi technique
You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A. Cookies folder
B. Temporary Internet Folder
C. Download folder
D. History folder
You are the Network Administrator for a bank. You discover that someone has logged in with a user account access, but then used various techniques to obtain access to other user accounts. What is this called?
A. Vertical Privilege Escalation
B. Session Hijacking
C. Account hijacking
D. Horizontal Privilege Escalation