Question 96

Ann is the IS manager for several new systems in which the classifications of the systems' data are being decided. She is trying to determine the sensitivity level of the data being processed.
Which of the following people should she consult to determine the data classification?
  • Question 97

    When a malicious user is able to retrieve sensitive information from RAM, the programmer has failed a implement:
  • Question 98

    A wireless network uses a RADIUS server that is connected to an authenticator, which in turn connects to a supplicant. Which of the following represents the authentication architecture in use?
  • Question 99

    Which of the following must be intact for evidence to be admissible in court?
  • Question 100

    Which of the following network vulnerability scan indicators BEST validates a successful, active scan?