71. An employee in an organization is requesting access to more information than is required. This request should be denied on the basis of which principle:
Correct answer: (C)
Need to know
72. An employee with a previous criminal history was terminated. The former employee leaked several sensitive documents to the news media. To prevent this, the organization should have:
Correct answer: (D)
Performed a background verification prior to hiring the employee
73. An Ethernet network that consists of a central Ethernet switch with cabling running to each station is best described as a:
Correct answer: (D)
Logical bus and physical star
74. An information system has multiple levels of security implemented, for both resources as well as users. In this system, a user cannot access resources below his level, and a user cannot create resources above his level. The access control model that most closely resembles this is:
Correct answer: (C)
Biba
75. An information system that processes sensitive information is configured to require a valid userid and strong password from any user. This process of accepting and validating this information is known as:
Correct answer: (A)
Authentication
76. An intruder wishes to break in to an application in order to steal information stored there. Because the application utilizes strong authentication, what is the most likely approach the intruder will take?
Correct answer: (C)
Application bypass attack
77. An IT manager wishes to connect several branch offices to the headquarters office for voice and data communications. What packet switched service should the IT manager consider?
Correct answer: (C)
MPLS
78. An organization employs hundreds of office workers that use computers to perform their tasks. What is the best plan for informing employees about security issues?
Correct answer: (B)
Perform security awareness training at the time of hire and annually thereafter
79. An organization has a strong, management-driven model of security- related activities such as policy, risk management, standards, and processes. This model is better known as:
Correct answer: (C)
Security governance
80. An organization has been made a party in a civil lawsuit. The organization is required to search its electronic records for specific memoranda. This process is known as:
Correct answer: (D)
Electronic discovery