11. A database administrator (DBA) is responsible for carrying out security policy, which includes controlling which users have access to which data. The DBA has been asked to make just certain fields in some database tables visible to some new users. What is the best course of action for the DBA to take?
Correct answer: (D)
Create a view that contains only the fields that the users are permitted to see
12. A defense-in-depth strategy for anti-malware is recommended because:
Correct answer: (A)
There are many malware attack vectors
13. A DRP project team has determined that the RTO for a specific application shall be set to 180 minutes. Which option for a recovery system will best meet the application's recovery needs?
Correct answer: (B)
Server clustering and data replication
14. A financial services organization is required to protect information about its customers. Which of these laws requires this protection:
Correct answer: (D)
GLBA
15. A forensics investigator has been asked to examine the workstation used by an employee who has been known to misbehave in the past. This investigation is related to more potential misconduct. What approach should the investigator take in this new investigation?
Correct answer: (A)
Approach this investigation objectively, without regard to the history of this employee's conduct
16. A hidden means of communication between two systems has been discovered. This is known as:
Correct answer: (B)
Covert channel
17. A list of all of the significant events that occur in an application is known as:
Correct answer: (A)
Audit log
18. A network engineer who is examining telecommunications circuits has found one that is labeled as a DS-1. What is the maximum throughput that may be expected from this circuit?
Correct answer: (C)
Approximately 170k chars/sec
19. A network manager wishes to simplify management of all of the network devices in the organization through centralized authentication. Which of the following available authentication protocols should the network manager choose:
Correct answer: (A)
RADIUS
20. A particular encryption algorithm transforms plaintext to ciphertext by XORing the plaintext with the encryption key. This is known as:
Correct answer: (D)
Stream cipher