2) What is the main goal of information security? A) Protect information from unauthorized use.
3) Does turning off a computer make the information it contains secure? D) No, because secure data must still be available to authorized users.
4) Which of the following is the best description of a security control? C) A mechanism that protects a resource
5) Which of the following could be classified as a logical control? A) Firewall
6) Which of the following could be classified as a detective control? D) Log monitor
7) Which of the tenets of information security most directly serves the needs of authorized users? A) Availability
8) Which of the tenets of information security is most related to the “need to know” property? C) Confidentiality
9) Where is the most likely place a database management system would run? B) Server
10) Which Microsoft Windows Server 2008 R2 edition would be most appropriate for large-scale deployment using extensive virtualization? A) Datacenter
11) According to the Microsoft EULA, what is the extent that can be recovered due to a Windows fault? B) The price paid for the software license
12) Which of the following is the best definition of a threat? D) Any action that could lead to damage
13) What worm was released in 2001 and primarily defaced web sites? C) Code Red
14) What term describes a malicious software program that users are tricked into running? A) Trojan horse
15) Which of the following defines the cycle used to address Windows threats and vulnerabilities? B) Discovery-analysis-remediation