161. The main reason that a DRP project should have executive support and approval is:
A DRP project is very expensive
A DRP project requires significant adjustments in the allocation of resources
A DRP project requires the redesign of all in-scope IT systems
A DRP project requires the redesign of all in-scope business processes
Correct answer: (B) A DRP project requires significant adjustments in the allocation of resources
162. The most effective countermeasures against input attacks are:
Input field filtering, application firewall, application vulnerability scanning, and developer training
Input field filtering, application firewall, and intrusion prevention system
Input field filtering, application firewall, intrusion detection system, and ethical hacking
Application firewall, intrusion detection system, and developer training
Correct answer: (A) Input field filtering, application firewall, application vulnerability scanning, and developer training
163. The most effective way to confirm whether backups function properly is:
Confirming the presence of error messages in backup logs
Confirming the absence of error messages in backup logs
Testing the ability to backup data onto backup media
Testing the ability to restore data from backup media
Correct answer: (D) Testing the ability to restore data from backup media
164. The options for risk treatment are:
Risk reduction, risk assumption, risk avoidance, and risk acceptance
Risk acceptance, risk reduction, risk transfer, and risk mitigation
Risk acceptance, risk reduction, and risk transfer
Risk acceptance, risk avoidance, risk reduction, and risk transfer
Correct answer: (D) Risk acceptance, risk avoidance, risk reduction, and risk transfer
165. The owners of files and directories on a file server are able to control which personnel may access those files and directories. The access control model that most closely resembles this is:
Role-based access control (RBAC)
Mandatory access control (MAC)
Discretionary access control (DAC)
Multilevel access
Correct answer: (C) Discretionary access control (DAC)
166. The Payment Card Industry Data Security Standard (PCI DSS) requires encryption of credit card in which circumstances:
Stored in databases, stored in flat files, and transmitted over public and private networks
Stored in databases, and transmitted over public networks
Stored in databases, stored in flat files, and transmitted over public networks
Stored in databases, and transmitted over public and private networks
Correct answer: (C) Stored in databases, stored in flat files, and transmitted over public networks
167. The phases of a comprehensive security incident plan are: