A) Perform a service provider PCI-DSS assessment on a yearly basis
B) Validate the service provider's PCI-DSS compliance status on a regular basis
C) Validate that the service providers security policies are in alignment with those of the organization
D) Ensure that the service provider updates and tests its Disaster Recovery Plan (DRP) on a yearly basis
Correct Answer
verified
Multiple Choice
A) Configuration
B) Identity
C) Compliance
D) Patch
Correct Answer
verified
Multiple Choice
A) Network perimeters
B) Demilitarized Zones (DMZ)
C) Databases and back-end servers
D) End-user devices
Correct Answer
verified
Multiple Choice
A) Taking baseline signal level of the cable
B) Measuring signal through external oscillator solution devices
C) Outlining electromagnetic field strength
D) Performing network vulnerability scanning
Correct Answer
verified
Multiple Choice
A) Good communication throughout the organization
B) A completed Business Impact Analysis (BIA)
C) Formation of Disaster Recovery (DR) project team
D) Well-documented information asset classification
Correct Answer
verified
Multiple Choice
A) Enumeration
B) Reporting
C) Detection
D) Discovery
Correct Answer
verified
Multiple Choice
A) Identify critical security infrastructure
B) Establish baseline security controls
C) Establish an information security policy
D) Identify factors affecting information security
Correct Answer
verified
Multiple Choice
A) Link layer
B) Physical layer
C) Session layer
D) Application layer
Correct Answer
verified
Multiple Choice
A) Monitor performance in production environments
B) Perform a structured code review
C) Perform application penetration testing
D) Use automated security vulnerability testing tools
Correct Answer
verified
Multiple Choice
A) Trusted third-party certification
B) Lightweight Directory Access Protocol (LDAP)
C) Security Assertion Markup language (SAML)
D) Cross-certification
Correct Answer
verified
Multiple Choice
A) It reuses security mechanisms derived from existing protocols
B) It supports end-to-end security natively
C) It leverages Hypertext Transfer Protocol (HTTP) over Transport Layer Security (TLS)
D) It requires a Public Key Infrastructure (PKI)
Correct Answer
verified
Multiple Choice
A) SOC 1 Type 1
B) SOC 1 Type 2
C) SOC 2
D) SOC 3
Correct Answer
verified
Multiple Choice
A) Test
B) Assessment
C) Review
D) Peer review
Correct Answer
verified
Multiple Choice
A) Point-to-Point Tunneling Protocol (PPTP)
B) Routing Information Protocol (RIP)
C) Password Authentication Protocol (PAP)
D) Challenge Handshake Authentication Protocol (CHAP)
Correct Answer
verified
Multiple Choice
A) Penetration testing
B) Vulnerability management
C) Software Development Life Cycle (SDLC)
D) Life cycle management
Correct Answer
verified
Multiple Choice
A) Processes and tools over individuals and interactions
B) Contract negotiation over customer collaboration
C) Following a plan over responding to change
D) Working software over comprehensive documentation
Correct Answer
verified
Multiple Choice
A) Into the options field
B) Between the delivery header and payload
C) Between the source and destination addresses
D) Into the destination address
Correct Answer
verified
Multiple Choice
A) Penetration
B) System
C) Performance
D) Vulnerability
Correct Answer
verified
Multiple Choice
A) Compartmentalization
B) Segmentation
C) Error correction
D) Virtual Local Area Network (VLAN) tagging
Correct Answer
verified
Multiple Choice
A) Single Sign-On (SSO) authentication support
B) Privileged user authentication support
C) Password reset service support
D) Terminal Access Controller Access Control System (TACACS) authentication support
Correct Answer
verified
Showing 81 - 100 of 336
Related Exams