Which of the following penetration testing phases involves reconnaissance or data gathering?
Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?
Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?
Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?
You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?
Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.
Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?