73 Which of the following are typical elements of a corporate password policy? (Choose all that apply.)Minimum password lengthUse of special charactersUnique passwordsFrequent password changes
74 Alice is implementing a new password policy that requires all users to change their passwords every seven days. What further modification can she make to the password policy to prevent users from thwarting the password change requirement?Specify a minimum password lengthRequire the use of special charactersRequire the creation of unique passwordsSpecify a maximum password change interval
75 Which of the following are settings typically included in an account lockout policy? (Choose all that apply.)Account lockout durationTime allowed between attemptsAccount lockout thresholdReset account lockout threshold counter
76 How do account lockouts help to prevent intruders from cracking passwords?By forcing users to select passwords of a minimum lengthBy preventing users from entering incorrect passwords more than a specified number of timesBy preventing users from reusing the same passwordsBy requiring an additional authentication method, such as a fingerprint
77 Which of the following data loss prevention terms is used to describe dangers pertaining to data that is being transmitted over a network? (Choose all that apply.)Data in useData at restData in motionData in transit
78 Which of the following data loss prevention terms is used to describe dangers pertaining to data while a user is loading it into an application?Data in useData at restData in processData in motion
79 Which of the following data loss prevention terms is used to describe potential dangers of data loss or data leakage to unauthorized parties while the data is stored without being used?Data in useData at restData in motionData on disk
80 Which of the following is not one of the standard terms used in data loss prevention?Data onlineData at restData in motionData in use
81 The terms on-boarding and off-boarding are typically associated with which of the following policies?Data loss preventionIncident responseInventory managementIdentity managementDisaster recoveryBusiness continuity
82 The term off-boarding refers to which of the following procedures?Removing a node from a clusterDisconnecting all cables from a switchRevoking a user's network privilegesRetiring old workstations
83 Which of the following is most likely to be the last step in a change management procedure?DocumentationNotificationApprovalScheduling
84 Which of the following U.S. organizations are capable of imposing international export controls on software products? (Choose all that apply.)The company that created the softwareDepartment of StateDepartment of CommerceDepartment of the Treasury
85 Which of the following is the primary result of an organization's security incident response policies?To know how to respond to a particular incidentTo prevent an incident from occurring againTo identify the cause of an incidentTo document the procedures leading up to an incident
86 You are an IT director, and a fire has broken out in the lower floors of your company's office building. After the personnel are evacuated, the fire department asks you where they can find documentation about all chemicals and equipment used in the company's datacenter, which is threatened by the fire. You direct them to the correct filing cabinet in your office, which contains which of the following document types?ESDNDABYODMSDS
87 You have been asked to draft an Acceptable Use Policy (AUP) for new hires at your company to sign, which specifies what they can and cannot do when working with the company's computers and network. Which of the following is not one of the provisions typically found in this type of document?PrivacyOwnershipIllegal useUpgrades
88 You are starting a new job, and the company's Human Resources (HR) department has asked you to sign an Acceptable Use Policy (AUP) regarding computer and network use. The document includes a privacy clause. Which of the following are specifications you can expect to find in this clause? (Choose all that apply.)Any emails you send or receive can be monitored by the company at any time.All files and data that you store on company computers must be accessible to the company for scanning and monitoring.All work that you perform for the company becomes the sole property of the company, including copyrights and patents.All hardware, software, and any proprietary data stored on the company's computers remains the property of the company.
89 Which of the following tasks is not considered to be part of an IT department's incident response plan?Stopping an ongoing incidentContaining the damage caused by an incidentRepairing the damage caused by an incidentRebuilding an infrastructure destroyed by an incident
90 Which of the following are occurrences that are typically addressed by an IT department's incident response policies? (Choose all that apply.)Denial-of-Service (DoS) attackHard disk failureElectrical fireServer outage
91 Which of the following terms would apply to the procedure of adding a user's personal smartphone to the network under a Bring Your Own Device (BYOD) policy?Out-of-bandOn-boardingIn-bandOff-boarding
92 Your company has been acquired by another firm and, as IT director, you will have to comply with the new firm's safety policies in your datacenter and other IT workspaces. One of the new requirements states that there must be a fail closed policy for the datacenter. Which of the following best describes what this policy dictates should occur in the event of an emergency?All computers that are logged on should automatically log off.All computers that are running should automatically shut down.All doors that are normally open should lock themselves.All doors that are normally locked should open themselves.
93 You are the first responder to an incident of computer crime at your company. The datacenter's security has been penetrated, a server accessed, and sensitive company data stolen. The company's incident response plan lists the specific tasks that you are responsible for performing. Which of the following are likely to be among those tasks? (Choose all that apply.)Turn off the server.Secure the area.Document the scene.Collect evidence.Cooperate with the authorities.
94 Password policies frequently require users to specify complex passwords. Which of the following are characteristic of a complex password?Passwords that contain mixed upper- and lowercase letters, numbers, and symbolsPasswords that exceed a specific lengthPasswords that do not duplicate a specific number of the user's previous passwordsPasswords that do not duplicate the user's account name, birth date, or other personal information
95 Password policies that contain a history requirement typically have which of the following limitations?Users cannot reuse recent passwords.Users cannot create passwords containing names of relatives.Users cannot create passwords containing names of historical figures.Users cannot create passwords that duplicate those of any other users on the network.
96 Account lockout policies are designed to protect against which of the following types of attacks?Social engineeringSpoofingBrute forceMan in the middle
97 Which of the following types of password policies are designed to prevent brute-force attacks? (Choose all that apply.)Password length policiesAccount lockout policiesPassword history policiesComplex password policies
98 Which of the following is not likely to be a procedural element of an IT asset disposal policy?Data deletionRecyclingData preservationInventory
99 While negotiating a new contract with a service provider, you have reached a disagreement over the contracted reliability of the service. The provider is willing to guarantee that the service will be available 99 percent of the time, but you have been told to require 99.9 percent. When you finally reach an agreement, the negotiated language will be included in which of the following documents?SLAAUPNDABYOD
Читать дальше