Reference no: EM133218357
1. Plan Protect and Respond is the management's security responsibility. What is management's main function under Planning?
None of the above
Comprehensive Policies
Risk Analysis
Defence in Depth
2. In the secure database access, secure communication must be enough to have secure access.
3. VoIP is a ______architecture
True
False
4. Which of the following factors are important for choosing a language to code IoT devices?
Developer familiarity
Availability of training
Industry acceptance
All of above
5. What is the technique that isolates the file to an untrusted container within the application and applies the most restrictive policies as to what code runs?
Evil twin
Phishing attack
Cross-site scripting
Sandboxing
6. Security management is defined as:
When will users access the resources?
What resources will users have access to?
Who will have access to data?
All of the above
7. Cybercriminals can distribute malware through drive by downloads. This technique is very popular with high volume online shopping websites."
True
False
8. "I repair people's computers. Sometimes I check the clients' documents for any errors and failure to open. But I didn't read them. However, I think I'm a hacker. "
True
False
9. Logging is not essential for forensic analysis and intrusion detection and helps ensure that controls are aligned with real world attacks.
True
False
10. Broken authentication weaknesses allow attackers to use manual or automatic ways to gain control over any account in a system and even gain total control.
True
False