21.
Proper security administration policies, controls, and procedures enforce which of the
following?
- A.The elimination of risk
- B.The total reduction of malware
- C.The AIC objectives
- D.Separation of duties
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Proper security administration policies, controls, and procedures enforce the AIC triad objectives, which are availability, integrity, and confi dentiality. |
22.
Which of the following best describes a threat exploiting a vulnerability?
- A.DDOS
- B.Risk
- C.A hurricane
- D.Power supply brownout
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Risk is the probability for likelihood that a threat will exploit the vulnerability. Options A, C, and D are distractors. |
23.
Which of the following best describes a security policy?
- A.It describes the requirement for shareholder satisfaction
- B.Lists potential risk targets within the organization
- C.Makes extensive use of baselines and guidelines
- D.Completely aligns with the mission, objectives, culture, and nature of the business
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
A security policy must be in alignment with the mission, objectives, nature, and culture of a business. Organizational policies are not based on best practices. |
24.
Which of the following best describes a federated relationship?
- A.Numerous franchises in a geographical area
- B.The airline industry
- C.HIPAA patient privacy requirements for healthcare providers
- D.Third-party companies and their networks share customer data based upon a single sign-on to a primary organization
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The Federation consists of third-party companies that share data based upon a one-time authentication of an individual. |
25.
Which of the following is an example of compensating control?
- A.A padlock on a gate
- B.A chain on the hotel room door
- C.A red bucket of sand with the word, “Fire”
- D.An insurance policy
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A compensating control is a secondary control placed into use if the fi rst or primary control is disabled or no longer usable. In this case, a hotel room door has a lock; the chain is a secondary or compensating control. |