SIMULATION Fill in the blank with an appropriate phrase.___________ is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. Correct
Which of the following is a variant with regard to Configuration Management?
A. A CI that has the same name as another CI but shares no relationship.
B. A CI that particularly refers to a hardware specification.
C. A CI that has the same essential functionality as another CI but a bit different in some small manner.
D. A CI that particularly refers to a software version.
Which of the following is the default port for Secure Shell (SSH)?
A. UDP port 161
B. TCP port 22
C. UDP port 138
D. TCP port 443
Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.
A. Password policies
B. Vulnerability assessments
C. Data encryption
D. Data classification
Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?
A. NSA-IAM
B. DITSCAP
C. ASSET
D. NIACAP
Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.
A. Shielding
B. Spoofing
C. Eavesdropping
D. Packaging
Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?
A. Business continuity plan
B. Disaster recovery plan
C. Continuity of Operations Plan
D. Contingency plan
Which of the following relies on a physical characteristic of the user to verify his identity?
A. Social Engineering
B. Kerberos v5
C. Biometrics
D. CHAP
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
A. Disaster Recovery Plan
B. Continuity of Operations Plan
C. Contingency Plan
D. Business Continuity Plan
Which of the following policies helps reduce the potential damage from the actions of one person?
A. CSA
B. Risk assessment
C. Separation of duties
D. Internal audit