<< Prev Question Next Question >>

Question 3/84

Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy.
What is the main theme of the sub-policies for Information Technologies?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (84q)
Question 1: By using a smart card and pin, you are using a two-factor au...
Question 2: In which of the following password protection technique, ran...
Question 3: Security Policy is a definition of what it means to be secur...
Question 4: You are a Penetration Tester and are assigned to scan a serv...
Question 5: Alice encrypts her data using her public key PK and stores t...
Question 6: A technician is resolving an issue where a computer is unabl...
Question 7: Look at the following output. What did the hacker accomplish...
Question 8: Bob, your senior colleague, has sent you a mail regarding aa...
Question 9: Bob learned that his username and password for a popular gam...
Question 10: Which of the following attacks exploits web age vulnerabilit...
Question 11: What two conditions must a digital signature meet?...
Question 12: Which of the following statements is TRUE?...
Question 13: Which of the following incident handling process phases is r...
Question 14: A large mobile telephony and data network operator has a dat...
Question 15: The following is part of a log file taken from the machine o...
Question 16: Why should the security analyst disable/remove unnecessary I...
Question 17: What is the least important information when you analyze a p...
1 commentQuestion 18: In which of the following cryptography attack methods, the a...
Question 19: Assume a business-crucial web-site of some company that is u...
Question 20: The establishment of a TCP connection involves a negotiation...
Question 21: You have successfully comprised a server having an IP addres...
Question 22: Which of the following is considered an exploit framework an...
Question 23: ........is an attack type for a rogue Wi-Fi access point tha...
Question 24: You need a tool that can do network intrusion prevention and...
Question 25: Shellshock allowed an unauthorized user to gain access to a ...
Question 26: A tester has been hired to do a web application security tes...
Question 27: Which is the first step followed by Vulnerability Scanners f...
Question 28: Based on the below log, which of the following sentences are...
Question 29: A regional bank hires your company to perform a security ass...
Question 30: What term describes the amount of risk that remains after th...
Question 31: Chandler works as a pen-tester in an IT-firm in New York. As...
Question 32: You are attempting to run an Nmap port scan on a web server....
Question 33: As an Ethical Hacker you are capturing traffic from your cus...
Question 34: An IT employee got a call from one of our best customers. Th...
Question 35: Which type of security feature stops vehicles from crashing ...
Question 36: What does a firewall check to prevent particular ports and a...
Question 37: You have successfully compromised a machine on the network a...
Question 38: On performing a risk assessment, you need to determine the p...
Question 39: Due to a slowdown of normal network operations, the IT depar...
Question 40: Which of the following Nmap commands will produce the follow...
Question 41: You are working as a Security Analyst in a company XYZ that ...
Question 42: An attacker, using a rogue wireless AP, performed an MITM at...
Question 43: Internet Protocol Security IPSec is actually a suite of prot...
Question 44: In Risk Management, how is the term "likelihood" related to ...
Question 45: Which of the following areas is considered a strength of sym...
Question 46: Which of the following antennas is commonly used in communic...
Question 47: You want to analyze packets on your wireless network. Which ...
Question 48: What is the most common method to exploit the "Bash Bug" or ...
Question 49: An attacker scans a host with the below command. Which three...
Question 50: A hacker has managed to gain access to a Linux host and stol...
Question 51: When you are testing a web application, it is very useful to...
Question 52: A security analyst is performing an audit on the network to ...
Question 53: A new wireless client is configured to join an 802.11 networ...
Question 54: Which tier in the N-tier application architecture is respons...
Question 55: To determine if a software program properly handles a wide r...
Question 56: John the Ripper is a technical assessment tool used to test ...
Question 57: Firewalls are the software or hardware systems that are able...
Question 58: Which of the following programs is usually targeted at Micro...
Question 59: Which of the following is an adaptive SQL Injection testing ...
Question 60: Jimmy is standing outside a secure entrance to a facility. H...
Question 61: An attacker is using nmap to do a ping sweep and a port scan...
Question 62: A bank stores and processes sensitive privacy information re...
Question 63: A network administrator discovers several unknown files in t...
Question 64: Some clients of TPNQM SA were redirected to a malicious site...
Question 65: You are the Network Admin, and you get a compliant that some...
Question 66: If you want only to scan fewer ports than the default scan u...
Question 67: You are monitoring the network of your organizations. You no...
Question 68: Which of the following provides a security professional with...
Question 69: Scenario: 1. Victim opens the attacker's web site. 2. Attack...
Question 70: DNS cache snooping is a process of determining if the specif...
Question 71: Cryptography is the practice and study of techniques for sec...
Question 72: Which component of IPsec performs protocol-level functions t...
Question 73: What is correct about digital signatures?...
Question 74: A hacker named Jack is trying to compromise a bank's compute...
Question 75: The collection of potentially actionable, overt, and publicl...
Question 76: Which of the following programming languages is most suscept...
Question 77: Which of the following security policies defines the use of ...
Question 78: What is attempting an injection attack on a web server based...
Question 79: During a recent security assessment, you discover the organi...
Question 80: An enterprise recently moved to a new office and the new nei...
Question 81: You perform a scan of your company's network and discover th...
Question 82: This asymmetry cipher is based on factoring the product of t...
Question 83: Which Nmap option would you use if you were not concerned ab...
Question 84: Which of the following will perform an Xmas scan using NMAP?...