Browse by Tags

70-298 Section 2.1
Tuesday, June 24, 2008 8:04 AM
What are the five pillars of information security? Read More...
70-298 Section 1.3 Answer
Monday, June 23, 2008 8:44 AM
What are the four consideration for identifying technology limitations? Answer: Existing hardware Existing operation system limitations Exist software constraints Existing legal requirements Read More...
70-640 Week 4 Q&A
Monday, June 23, 2008 8:34 AM
A user is added into a new security group, When does membership get evaluated? a) Logon b) Every 5 Minutes c) Every 30 minutes d) Logoff Read More...
70-298 Section 1.3
Sunday, June 22, 2008 8:42 AM
What are the four consideration for identifying technology limitations? Read More...
70-298 Section 1.2 Bonus Answer
Saturday, June 21, 2008 8:47 AM
What type of perimeter network is this called? Routed network External network Classic perimeter network Three segmented network Egress points network Answer: Three segmented network Read More...
70-298 Section 1.2 Bonus
Friday, June 20, 2008 8:31 AM
What type of perimeter network is this called? Routed network External network Classic perimeter network Three segmented network Egress points network Read More...
70-298 Section 1.2 Answer
Thursday, June 19, 2008 8:20 AM
Name 6 of the 12, Principles of Information Security Design? Answer: Separation of Duties Least Privilege Reduce the attack surface Defence in depth Diversity of mechanism Use of Fail-safe defaults Economy of mechanism Use of open design Complete mediation Psychological Acceptability Trust but Audit Keeping up to date Read More...
70-298 Section 1.1 Answer
Tuesday, June 17, 2008 8:51 AM
Should the IT Security Officer report to the Chief Information Officer (CIO) or Chief Technology Officer (CTO)? True or False False, you should never have the team that audits IT report that the same manager. Generally you will find that IT security officer will report Company Serurity Officer, who interns report directly to the CEO / President. Read More...
70-298 Section 1.1
Monday, June 16, 2008 7:46 AM
Should the IT Security Officer report to the Chief Information Officer (CIO) or Chief Technology Officer (CTO)? True or False Read More...
70-640 week 2 Question
Sunday, June 08, 2008 12:05 PM
Which tool can be used to view the permissions on a DS object? DSquesry.exe DSmod.exe DSadd.exe DSacls.exe Read More...
70-640 Week 1 Question
Sunday, June 08, 2008 11:50 AM
What does OU stand for? Read More...
More Posts « Previous page

This Blog

Archives

Syndication