All these Questions are in this Section were asked in Certified Ethical Hacker Examinations of EC-Council .This is the 15th part
1- Which type of security feature stops vehicles from crashing through the doors of a building?
2- During a security audit of IT processes, an IS auditor found that there were no documented security procedures. What should the IS auditor do?
A. Identify and evaluate existing practices
B. Create a procedures document
C. Conduct compliance testing
D. Terminate the audit
3- Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?
A. They provide a repeatable framework.
B. Anyone can run the command line scripts.
C. They are available at low cost
D. They are subject to government regulation.
4- . Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A. Restore a random ﬁle.
B. Perform a full restore.
C. Read the ﬁrst 512 bytes of the tape.
D. Read the last 512 bytes of the tape.
5-. Knowing the nature of backup tapes, which of the following is the MOST RECOMMENDED way of storing backup tapes?
A. In a cool dry environment
B. Inside the data center for faster retrieval in a ﬁreproof safe
C. In a climate controlled facility offsite
D. On a different ﬂoor in the same building
6- Security Policy is a deﬁnition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like; Computer Security Policy, Information Protection Policy, Information Security Policy, Network Security Policy, Physical Security Policy, Remote Access Policy, User Account Policy. What is main theme of the subpolicies for Information Technologies?
A. Authenticity, Conﬁdentiality, Integrity
B. Conﬁdentiality, Integrity, Availability
C. Availability, Non-repudiation, Conﬁdentiality
D. Authenticity, Integrity, Non-repudiation
7- An enterprise recently moved to a new ofﬁce and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?
A. Use fences in the entrance doors.
B. Install a CCTV with cameras pointing to the entrance doors and the street.
C. Use an IDS in the entrance doors and install some of them near the corners.
D. Use lights in all the entrance doors and along the company’s perimeter
8- If executives are found liable for not properly protecting their company’s assets and information systems, what type of law would apply in this situation?
9- Which type of security document is written with speciﬁc step-by-step details?
10- . A security policy will be more accepted by employees if it is consistent and has the support of
B. executive management.
C. the security ofﬁcer.
D. a supervisor.
Related Link ,See once
SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
>>> CONTACT US < <<