1. Which of the following measures is the MOST effective deterrent against disgruntled stall abusing their privileges?
A) Layered defense strategy
B) System audit log monitoring
C) Signed acceptable use policy
D) High-availability systems
2. The advantage of sending messages using steganographic techniques, as opposed to utilizing encryption, is that:
A) the existence of messages is unknown.
B) required key sizes are smaller.
C) traffic cannot be sniffed.
D) reliability of the data is higher in transit.
3. As an organization grows, exceptions to information security policies that were not originally specified may become necessary at a later date. In order to ensure effective management of business risks, exceptions to such policies should be:
A) considered at the discretion of the information owner.
B) approved by the next higher person in the organizational structure.
C) formally managed within the information security framework.
D) reviewed and approved by the security manager.
4. There is reason to believe that a recently modified web application has allowed unauthorized access. Which is the BEST way to identify an application backdoor?
A) Black box pen test
B) Security audit
C) Source code review
D) Vulnerability scan
5. Simple Network Management Protocol v2 (SNMP v2) is used frequently to monitor networks. Which of the following vulnerabilities does it always introduce?
A) Remote buffer overflow
B) Cross site scripting
C) Clear text authentication
D) Man-in-the-middle attack