1. Which of the following is the summary of loss for a given year?
A) ARO B) SLA C) MTBF D) ALE
2. Which of the following strategies should a systems architect use to minimize availability risks due to insufficient storage capacity?
A) High availability B) Scalability C) Distributive allocation D) Load balancing
3. Which of the following would provide additional security by adding another factor to a smart card?
A) Token B) PIN C) Physical key D) Proximity badge
4. Which of the following penetration testing concepts is an attacker MOST interested in when placing the path of a malicious file in the Windows/ CurrentVersion/Run registry key?
A) Persistence B) Active reconnaissance C) Pivoting D) Escalation of privilege
5. Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
A) Process affinity B) Buffer overflow C) Privilege escalation D) Pivoting
Leave a comment