Question.11 Which Wide Area Network (WAN) technology requires the first router in the path to determine the full path the packet will travel, removing the need for other routers in the path to make independent determinations? (A) Synchronous Optical Networking (SONET) (B) Multiprotocol Label Switching (MPLS) (C) Fiber Channel Over Ethernet (FCoE) (D) Session Initiation Protocol (SIP) |
11. Click here to View Answer
Correct Answer: B
Question.12 Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes? (A) File Integrity Checker (B) Security information and event management (SIEM) system (C) Audit Logs (D) Intrusion detection system (IDS) |
12. Click here to View Answer
Correct Answer: A
Question.13 Which of the following is included in change management? (A) Technical review by business owner (B) User Acceptance Testing (UAT) before implementation (C) Cost-benefit analysis (CBA) after implementation (D) Business continuity testing |
13. Click here to View Answer
Correct Answer: B
Question.14 A company is enrolled in a hard drive reuse program where decommissioned equipment is sold back to the vendor when it is no longer needed. The vendor pays more money for functioning drives than equipment that is no longer operational. Which method of data sanitization would provide the most secure means of preventing unauthorized data loss, while also receiving the most money from the vendor? (A) Pinning (B) Single-pass wipe (C) Multi-pass wipes (D) Degaussing |
14. Click here to View Answer
Correct Answer: C
Question.15 When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization Controls (SOC) certification for the vendor to possess? (A) SOC 1 Type 1 (B) SOC 2 Type 1 (C) SOC 2 Type 2 (D) SOC 3 |
15. Click here to View Answer
Correct Answer: C