The Return on Investment (ROI) measurement used in Information Technology and Information Security fields is typically calculated with which formula?
Correct Answer:A
Which access control mechanism requires a high amount of maintenance since all data must be classified, and all users granted appropriate clearance?
Correct Answer:A
What type of attack can be performed against a wireless network using the tool Kismet?
Correct Answer:B
What would the file permission example "rwsr-sr-x" translate to in absolute mode?
Correct Answer:B
Users at the Marketing department are receiving their new Windows XP Professional workstations. They will need to maintain local work files in the first logical volume, and will use a second volume for the information shared between the area group. Which is the best file system design for these workstations?
Correct Answer:A
When you log into your Windows desktop what information does your Security Access Token (SAT) contain?
Correct Answer:C