- (Exam Topic 10)
Host-Based Intrusion Protection (HIPS) systems are often deployed in monitoring or learning mode during their initial implementation. What is the objective of starting in this mode?
Correct Answer:
D
- (Exam Topic 10)
Refer to the information below to answer the question.
In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.
In a Bell-LaPadula system, which user cannot write to File 3?
Correct Answer:
D
- (Exam Topic 12)
Reciprocal backup site agreements are considered to be
Correct Answer:
B
- (Exam Topic 7)
What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?
Correct Answer:
C
- (Exam Topic 15)
A company is planning to implement a private cloud infrastructure. Which of the following recommendations will support the move to a cloud infrastructure?
Correct Answer:
D