One individual is selected from each department, to attend a security-awareness course. Each person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this?
What is mandatory sign-on? An authentication method that:
_______ involves gathering pieces of information and drawing a conclusion, whose sensitivity exceeds any of the individual pieces of information.
Which of the following should be included in an enterprise Business Continuity Plan (BCP)? (Choose THREE.)
_______ intrusion-detection systems learn the behavior of a machine or network, and create a baseline.
Which of the following are appropriate uses of asymmetric encryption? (Choose THREE.)
You are considering purchasing a VPN solution to protect your organization's information assets. The solution you are reviewing uses RFC-compliant and open-standards encryption schemes. The vendor has submitted the system to a variety of recognized testing authorities. The vendor does not make the source code available to testing authorities. Does this solution adhere to the secure design principle of open design?
If a firewall receives traffic not explicitly permitted by its security policy, what should the firewall do?
Public servers are typically placed in the _______, to enhance security.
Which of the following entities review partner-extranet requirements?
_______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.
At ABC Corporation, access to critical information resources, such as database and e-mail servers, is controlled by the information-technology (IT) department. The supervisor in the department grants access to printers where the printer is located. Managers grant and revoke rights to files within their departments' directories on the file server, but the IT department controls who has access to the directories. Which type of access-management system is in use at ABC Corporation?
When should procedures be evaluated?
How is bogus information disseminated?
Which of these metrics measure how a biometric device performs, when attempting to authenticate subjects? (Choose THREE.)