Question 19

- (Topic 2)
Which of the following refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens?

Correct Answer:A

Question 20

- (Topic 2)
Each time you start your computer, you receive an error message that your TCP/IP address is in use. Which of the following attacks is this?

Correct Answer:D

Question 21

- (Topic 1)
Which of the following are the goals of the cryptographic systems? Each correct answer represents a complete solution. Choose three.

Correct Answer:BCD

Question 22

- (Topic 2)
Web applications play a vital role in deploying different databases with user accessibility on the Internet. Which of the following allows an attacker to get unauthorized access to the database of a Web application by sending (attacking) user-supplied data to an interpreter as part of a command or query?

Correct Answer:B

Question 23

- (Topic 3)
Fred is the project manager for the TCC Company. His company has an internal policy that states each year they will provide free services to a nonprofit organization. Therefore, the company and its employees are not allowed to charge or receive money or gifts from the nonprofit organization they choose to provide free services. This year, the TCC Company offers to provide project management services to the children's hospital for a marketing campaign to raise money. Due to the TCC Company's project management services, the nonprofit agency exceeded previous years fund raising efforts. To show appreciation the nonprofit organization offered to reimburse the project manager for his travel expenses. Which of the following best describes how the project manager should handle the situation?

Correct Answer:B

Question 24

- (Topic 1)
Which of the following statements about asymmetric encryption are true? Each correct answer represents a complete solution. Choose two.

Correct Answer:BD

START GISF EXAM