1. When configuring settings in a mandatory access control environment,which of the following specifies the subjects that can access specific data objects?
A) System B) Administrator C) Owner D) User
2. Which of the following is an example of resource exhaustion?
A) Server CPU utilization peaks at 100% during the reboot process. B) An SQL injection attack returns confidential data back to the browser. C) System requirements for a new software package recommend having 12GB of RAM,but only BGB are available. D) A penetration tester requests every available IP address from a DHCP server.
3. When sending messages using symmetric encryption,which of the following must happen FIRST?
A) Agree on an encryption method B) Exchange encryption key C) Establish digital signatures D) Install digital certificates
4. Technicians working with servers hosted at the company's datacenter are increasingly complaining of electric shocks when touching metal items which have been linked to hard drive failures. Which of the following should be implemented to correct this issue?
A) Decrease the room temperature B) Utilize better hot/cold aisle configurations C) Increase humidity in the room D) Implement EMI shielding
5. The chief Security Officer (CSO) has reported a rise in data loss but no break ins have occurred. By doing which of the following is the CSO most likely to reduce the number of incidents?
A) Install perimeter barricades B) Conduct security awareness training C) Empty additional firewalls D) Implement protected distribution
Leave a comment