compiled from FedVTE test material
Which of the following should risk assessments be based upon as a best
practice?
A quantitative measurement of risk and impact and asset value
An absolute measurement of threats
A qualitative measurement of risk and impact
A survey of annual loss and potential threats and asset value
A quantitative measurement of risk and impact and asset value
Which of the following will not reduce EMI?
Humidity control
Physical shielding
Overhauling worn motors
Physical location
Humidity control
Which of the following mobile deployment models is the most security minded,
where the organization purchases the device and personal use is prohibited?
Corporate owned, personally enabled
Choose your own device
Corporate owned
Bring your own, corporate managed
Corporate owned
Which of the following is an example of restricting access to files based on the
identity of the user or group?
Mandatory Access Control
Discretionary Access Control
Certificate Revocation List
Public Key Infrastructure
Discretionary Access Control
The primary purpose of a load balancer is to:
Perform packet filtering
Block blacklisted content or web pages for a firewall
Expand servers and resources when needed
Capture packets for monitoring and analyzing
Expand servers and resources when needed
A conceptual framework that describes the functions of a networking or
telecommunication system
Open Systems Interconnection (OSI) model
, At which OSI model layer does the encryption and decryption of data for secure
transmission occur?
Layer 6 - Presentation Layer
Which layer of the TCP/IP model is equivalent to the Session, Presentation, and
Application layers of the OSI model?
Physical
Network
Transport
Application
D. Application
The MOST secured hashing algorithm is which of the following?
CHAP
MD5
SHA 1
LANMAN
MD5
Which of the following is NOT a Bluetooth threat?
Bluejacking
Smurf attack
Discovery mode
Bluesnarfing
Smurf attack
The company policy for availability requires full backups on Sunday and
incremental backups each week night at 10 p.m. The file server crashes on
Thursday afternoon. How many tapes will the technician need to restore the data
on the file server for Friday morning?
Four
Three
Two
One
Four
Which of the following creates separate logical networks?
Subnetting
NAC
NAT
DMZ
Subnetting
Which of the following describes a tool used by organizations to verify whether or
not a staff member has been participating in malicious activity?
Implicit deny