Sample Questions
Q) FITSAF advocates estimate by the Federal Information Technology Security. This methodology for assessing the security of information systems. Which of the following levels FITSAF shows that the procedures and controls are monitored and reviewed
a) Level 4
b) Level 5
c) Level 1
d) Level 2
e) Level 3
Q) Which of the following types of security controls and computers to identify security breaches networks
a) IPS
b) IDS
c) AS
d) EAP
e) None
Q) Which of the following is used to indicate that the software meets certain quality and ready for mass distribution either electronically or via physical media
a) ATM
b) RTM
c) CRO
d) DAA
e) None
Q) Which of the following protocols are used to establish a secure remote terminal in the network device
a) WEP
b) SMTP
c) SSH
d) IPSec
d) None
cissp-issep, courses, Engineering, Exam, Information, march, Security, Systems, Udemy
Comments RSS Feed