Chapter 11 ■ Practice Test 3 279
- What law prevents the removal of protection mechanisms placed on a copyrighted work by
the copyright holder?
A. H I PA A
B. DMCA
C. GLBA
D. ECPA - Linda is selecting a disaster recovery facility for her organization, and she wishes to retain
independence from other organizations as much as possible. She would like to choose a
facility that balances cost and recovery time, allowing activation in about one week after a
disaster is declared. What type of facility should she choose?
A. Cold site
B. Warm site
C. Mutual assistance agreement
D. Hot site - Purchasing insurance is a form of what type of risk response?
A. Transfer
B. Avoid
C. Mitigate
D. Accept
- What type of penetration testing provides detail on the scope of a penetration test—
including items like what systems would be targeted—but does not provide full visibility
into the configuration or other details of the systems or networks the penetration tester
must test?
A. Crystal box
B. White box
C. Black box
D. Gray box - Test coverage is computed using which of the following formulas?
A. Number of use cases tested/total number of use cases
B. Number of lines of code tested/total number of lines of code
C. Number of functions tested/total number of functions
D. Number of conditional branches tested/Total number of testable branches
- TCP and UDP both operate at what layer of the OSI model?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5