1. Ensuring that an organization can conduct security reviews within third-party facilities is PRIMARILY enabled by:
A) service level agreements (SLAs) B) acceptance of the organization's security policies C) contractual agreements D) audit guidelines
2. Which of the following will protect the confidentiality of data transmitted over the Internet?
A) Message digests B) Network address translation C) Encrypting file system D) IPsec protocol
3. The business advantage of implementing authentication tokens is that they:
A) provide nonrepudiation B) reduce overall cost C) improve access security D) reduce administrative workload
4. A contract bid is digitally signed and electronically mailed. The PRIMARY advantage to using a digital signature is that:
A) the bid and the signature can be copied from one document to another B) the bid cannot be forged even if the keys are compromised C) the signature can be authenticated even if no encryption is used D) any alteration of the bid will invalidate the signature
5. A data leakage prevention (DLP) solution has identified that several employees are sending confidential company data to their personal email addresses in violation of company policy. The information security manager should FIRST:
A) contact the employees involved to retake security awareness training B) notify senior management that employees are breaching policy C) limit access to the Internet for employees involved D) initiate an investigation to determine the full extent of noncompliance
Leave a comment