Question 67

The Return on Investment (ROI) measurement used in Information Technology and Information Security fields is typically calculated with which formula?

Correct Answer:A

Question 68

Which access control mechanism requires a high amount of maintenance since all data must be classified, and all users granted appropriate clearance?

Correct Answer:A

Question 69

What type of attack can be performed against a wireless network using the tool Kismet?

Correct Answer:B

Question 70

What would the file permission example "rwsr-sr-x" translate to in absolute mode?

Correct Answer:B

Question 71

Users at the Marketing department are receiving their new Windows XP Professional workstations. They will need to maintain local work files in the first logical volume, and will use a second volume for the information shared between the area group. Which is the best file system design for these workstations?

Correct Answer:A

Question 72

When you log into your Windows desktop what information does your Security Access Token (SAT) contain?

Correct Answer:C

START GSEC EXAM