ISMN-5730 Exam 3 Quizzes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How many bits compose an IP address?

32

What is a common framework used to develop an enterprise security architecture?

Zachman

architecture diagram

a complete conceptual model of systems including software, hardware, and users

mobile code/content

a video-streaming applet written in Java and downloaded to clients from a server

initial requirement of establish a BCP

agree on scope of the plan

Regarding application security, what is not a common issue that poses a potential threat?

check sum redistribution

Enterprise security architecture does not address _______.

configurations for technical infrastructure

What is not true about enterprise security architecture?

development of the architecture is primarily end-user driven

What is generally not considered to be a part of a data network?

end-user

the most important goal of any BCP

ensure the survivability of the business

hot site

fully equipped backup center with external interfaces (power, water, etc.) and telecommunications, as well as complete computing resources on site

In the testing phase of an application development project, what is not a desirable characteristic of test data that will be used to evaluate a newly developed application?

it should be live real-time online data from the current production system

In the 'Project Initiation' phase of the SDLC, what is not an important consideration for a security professional?

perform unit test to evaluate the security of code

What is not a principle benefit of an enterprise security architecture?

promote a positive perspective for systems management across the enterprise

What is the first step in establishing organization control for remote access?

publish a clear policy on remote access

To resolve IP numbers to names and names to IP numbers is is the function of _______.

the DNS

OSI is the model upon which _______.

the TCI/IP protocol is based

BIA

the process of analyzing all business functions to determine the effect of IT outages in the business

buffer overflow attack

when application developers fail to provide appropriate means in application source code to truncate or limit input string size to interface fields


Ensembles d'études connexes

Transtheoretical Model & Stages of Change

View Set

Mastery Astronomy Assign 3-Chapters 4&5

View Set

Iowa laws, rules, and regulations

View Set

Modeling with Two-Variable Linear Inequalities: Quiz

View Set

Nutrition for Childbearing; McKinney

View Set