Home
You may like this!
21.
Proper security administration policies, controls, and procedures enforce which of the following?
  • A.
    The elimination of risk
  • B.
    The total reduction of malware
  • C.
    The AIC objectives
  • D.
    Separation of duties
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Proper security administration policies, controls, and procedures enforce the AIC triad objectives, which are availability, integrity, and confi dentiality.
Report
Name Email  
22.
Which of the following best describes a threat exploiting a vulnerability?
  • A.
    DDOS
  • B.
    Risk
  • C.
    A hurricane
  • D.
    Power supply brownout
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Risk is the probability for likelihood that a threat will exploit the vulnerability. Options A, C, and D are distractors.
Report
Name Email  
23.
Which of the following best describes a security policy?
  • A.
    It describes the requirement for shareholder satisfaction
  • B.
    Lists potential risk targets within the organization
  • C.
    Makes extensive use of baselines and guidelines
  • D.
    Completely aligns with the mission, objectives, culture, and nature of the business
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
A security policy must be in alignment with the mission, objectives, nature, and culture of a business. Organizational policies are not based on best practices.
Report
Name Email  
24.
Which of the following best describes a federated relationship?
  • A.
    Numerous franchises in a geographical area
  • B.
    The airline industry
  • C.
    HIPAA patient privacy requirements for healthcare providers
  • D.
    Third-party companies and their networks share customer data based upon a single sign-on to a primary organization
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The Federation consists of third-party companies that share data based upon a one-time authentication of an individual.
Report
Name Email  
25.
Which of the following is an example of compensating control?
  • A.
    A padlock on a gate
  • B.
    A chain on the hotel room door
  • C.
    A red bucket of sand with the word, “Fire”
  • D.
    An insurance policy
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A compensating control is a secondary control placed into use if the fi rst or primary control is disabled or no longer usable. In this case, a hotel room door has a lock; the chain is a secondary or compensating control.
Report
Name Email