Certified Ethical Hacker Examination-Questions & Answers- #15

All these Questions are in this Section were asked in Certified Ethical Hacker Examinations of EC-Council .This is the 15th part


1- Which type of security feature stops vehicles from crashing through the doors of a building?

A. Turnstile
B. Bollards
C. Mantrap
D. Receptionist

Answer: B. Bollards

2- During a security audit of IT processes, an IS auditor found that there were no documented security procedures. What should the IS auditor do?
A. Identify and evaluate existing practices
B. Create a procedures document
C. Conduct compliance testing
D. Terminate the audit

Answer: A. Identify and evaluate existing practices




Related Link=> Previous post of Ethical Hacker Examination Que & Ans.
Part-13 , Part-14
Part-7 , Part-8 , Part-9 , Part-10 , Part-11 , Part-12
Part-6 , Part-5 , Part-4 , Part-3 , Part-2 , Part-1

3- Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?
A. They provide a repeatable framework.
B. Anyone can run the command line scripts.
C. They are available at low cost
D. They are subject to government regulation.

Answer: A. They provide a repeatable framework.

4- . Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A. Restore a random file.
B. Perform a full restore.
C. Read the first 512 bytes of the tape.
D. Read the last 512 bytes of the tape.

Answer: B. Perform a full restore.

5-. Knowing the nature of backup tapes, which of the following is the MOST RECOMMENDED way of storing backup tapes?
A. In a cool dry environment
B. Inside the data center for faster retrieval in a fireproof safe
C. In a climate controlled facility offsite
D. On a different floor in the same building

Answer: C. In a climate controlled facility offsite

6- Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like; Computer Security Policy, Information Protection Policy, Information Security Policy, Network Security Policy, Physical Security Policy, Remote Access Policy, User Account Policy. What is main theme of the subpolicies for Information Technologies?
A. Authenticity, Confidentiality, Integrity
B. Confidentiality, Integrity, Availability
C. Availability, Non-repudiation, Confidentiality
D. Authenticity, Integrity, Non-repudiation

Answer: B. Confidentiality, Integrity, Availability



Related Link=> Previous post of Ethical Hacker Examination Que & Ans.
Part-13 , Part-14
Part-7 , Part-8 , Part-9 , Part-10 , Part-11 , Part-12
Part-6 , Part-5 , Part-4 , Part-3 , Part-2 , Part-1

7- An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?
A. Use fences in the entrance doors.
B. Install a CCTV with cameras pointing to the entrance doors and the street.
C. Use an IDS in the entrance doors and install some of them near the corners.
D. Use lights in all the entrance doors and along the company’s perimeter

Answer: B. Install a CCTV with cameras pointing to the entrance doors and the street

8- If executives are found liable for not properly protecting their company’s assets and information systems, what type of law would apply in this situation?
A. Common
B. Civil
C. International
D. Criminal

Answer: B. Civil

9- Which type of security document is written with specific step-by-step details?
A. Process
B. Procedure
C. Policy
D. Paradigm

Answer: B. Procedure

10- . A security policy will be more accepted by employees if it is consistent and has the support of
A. coworkers.
B. executive management.
C. the security officer.
D. a supervisor.

Answer: B. executive management



Related Link
Computer Networking #1 -Questions and Answers
SQL Database #3 -Questions & Answers
SQL Database #2 -Questions & Answers
SQL Database #1 -Questions & Answers


Related Link ,See once

SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science
>>> CONTACT US < <<

Comment Please