Privacy     T.O.S.     F.A.Q.     Why Cats?     Endpoint     Donate     WhiskerHub     Status     Contact  


Register

I'm a gatekeeper, tenfold in my might,
To enter the realm, you must prove right.
Answer me ten, security's delight,
Unlock the path, through knowledge's light.
BCWHS

  1) Who is accountable for implementing information security?
   Everyone
   Senior management
   Security officer
   Data owners
 
  2) What is the right time to plan for security?
   Pre-deployment
   Post-deployment
   Testing Phase
   Monitoring Phase
 
  3) What is optimal placement for network based intrusion detection system (NIDS)?
   External Service Provider
   Network Operation Center (NOC)
   Network segments with business critical systems (DMZ) and certain intranet segments
   Network perimeter to alert network admins of suspicious traffic
 
  4) The best way to ensure that no data remanence of sensitive information that was stored on a DVD-R media is by
   Deletion
   Destruction
   Overwritting
   Degaussing
 
  5) Who should receive business continuity plan training in an organization?
   Those with specific business continuity roles
   First responders
   Senior executives
   Everyone
 
  6) The running key cipher is based on what?
   Modular math
   Exponentiation
   Substitution cipher
   XOR math
 
  7) Technical evaluation of assurance to ensure that security requirements have been met is known as?
   Accreditation
   Evaluation
   Validation
   Verfication
 
  8) Which phase best defines a business disaster recovery plan?
   An approved set of preparations and procedures for responding to a disaster
   A set of plans for preventing a disaster
   The adequate preparation and procedures for the continuation of all organization functions
   A set of preparations and procedures for responding to a disaster without management approval
 
  9) Single loss expectancy (SLE) is calculated by using?
   Asset value and annualized rate of occurrence (ARO)
   Asset value, local annual frequency estimate (LAFE), and standard annual frequency estimate (SAFE)
   Asset value and exposure factor
   Local annual frequency estimate and annualized rate of occurrence
 
  10) Which is a disadvantage of biometrics?
   Encryption
   Placement
   Communications
   User acceptance
 
 
© 2023 Black Cat White Hat Security LLC - All rights reserved. - 05/04/2024