1. The Chief Technology Officer (CTO) of a company,Ann,is putting together a hardware budget for the next 10 years. She is asking for the average lifespan of each hardware device so that she is able to calculate when she will have to replace each device. Which of the following categories BEST describes what she is looking for?
A) MTTF B) ALE C) MTTR D) MTBF
2. The Chief Information Security Officer (CISO) in a company is working to maximize protection efforts of sensitive corporate data. The CISO implements a - 100% shred policy within the organization,with the intent to destroy any documentation that is not actively in use in a way that it cannot be recovered or reassembled. Which of the following attacks is this deterrent MOST likely to mitigate?
A) Dumpster diving B) Shoulder surfing C) Vishing D) Whaling
3. The security administrator has noticed cars parking just outside of the building fence line. Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)(Select 2answers)
A) Implement a warning banner B) Adjust power level controls C) Create a honeynet D) Reduce beacon rate E) Change antenna placement F) Add false SSIDs
4. Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Select two.)(Select 2answers)
A) Rainbow table attacks greatly reduce compute cycles at attack time. B) Rainbow table attacks do not require access to hashed passwords. C) Rainbow table attacks must be performed on the network. D) Rainbow tables must include precomputed hashes. E) Rainbow table attacks bypass maximum failed login restrictions.
5. Which of the following describes the maximum amount of time a mission essential function can operate without the systems it depends on before significantly impacting the organization?
Leave a comment