1. To determine the ALE of a particular risk,which of the following must be calculated? (Select two.)(Select 2answers)
A) SLE B) RPO C) ARO D) RTO E) ROI
2. Which of the following types of penetration test will allow the tester to have access only to password hashes prior to the penetration test?
A) Black box B) Credentialed C) White box D) Gray box
3. Which of the following types of security testing is the MOST cost-effective approach used to analyze existing code and identity areas that require patching?
A) Red team B) Blue team C) White box D) Gray box E) Black box
4. While investigating a virus infection,a security analyst discovered the following on an employee laptop: Multiple folders containing a large number of newly released movies and music files Proprietary company data A large amount of PHI data Unapproved FTP software Documents that appear to belong to a competitor Which of the following should the analyst do FIRST?
A) Back up the files and return the device to the user B) Wipe and reimage the device C) Contact the legal and compliance department for guidance D) Delete the files,remove the FTP software,and notify management
5. While reviewing the monthly internet usage it is noted that there is a large spike in traffic classified as 'unknown' and does not appear to be within the bounds of the organizations Acceptable Use Policy. Which of the following tool or technology would work BEST for obtaining more information on this traffic?
A) IDS logs B) Firewall logs C) Increased spam filtering D) Protocol analyzer
Leave a comment