ISMN-5730 Exam 3 Quizzes
How many bits compose an IP address?
32
What is a common framework used to develop an enterprise security architecture?
Zachman
architecture diagram
a complete conceptual model of systems including software, hardware, and users
mobile code/content
a video-streaming applet written in Java and downloaded to clients from a server
initial requirement of establish a BCP
agree on scope of the plan
Regarding application security, what is not a common issue that poses a potential threat?
check sum redistribution
Enterprise security architecture does not address _______.
configurations for technical infrastructure
What is not true about enterprise security architecture?
development of the architecture is primarily end-user driven
What is generally not considered to be a part of a data network?
end-user
the most important goal of any BCP
ensure the survivability of the business
hot site
fully equipped backup center with external interfaces (power, water, etc.) and telecommunications, as well as complete computing resources on site
In the testing phase of an application development project, what is not a desirable characteristic of test data that will be used to evaluate a newly developed application?
it should be live real-time online data from the current production system
In the 'Project Initiation' phase of the SDLC, what is not an important consideration for a security professional?
perform unit test to evaluate the security of code
What is not a principle benefit of an enterprise security architecture?
promote a positive perspective for systems management across the enterprise
What is the first step in establishing organization control for remote access?
publish a clear policy on remote access
To resolve IP numbers to names and names to IP numbers is is the function of _______.
the DNS
OSI is the model upon which _______.
the TCI/IP protocol is based
BIA
the process of analyzing all business functions to determine the effect of IT outages in the business
buffer overflow attack
when application developers fail to provide appropriate means in application source code to truncate or limit input string size to interface fields