298 Chapter 12 ■ Practice Test 4
- What type of communications rely on a timing mechanism using either an independent
clock or a time stamp embedded in the communications?
A. Analog
B. Digital
C. Synchronous
D. Asynchronous - Chris is deploying a gigabit Ethernet network using Category 6 cable between two build-
ings. What is the maximum distance he can run the cable according to the Category 6
standard?
A. 5 0 meters
B. 1 00 meters
C. 2 00 meters
D. 3 00 meters - Howard is a security analyst working with an experienced computer forensics investigator.
The investigator asks him to retrieve a forensic drive controller, but Howard cannot locate
a device in the storage room with this name. What is another name for a forensic drive
controller?
A. RAID controller
B. Write blocker
C. SCSI terminator
D. Forensic device analyzer - The web application that Saria’s development team is working on needs to provide secure
session management that can prevent hijacking of sessions using the cookies that the appli-
cation relies on. Which of the following techniques would be the best for her to recom-
mend to prevent this?
A. Set the Secure attribute for the cookies, thus forcing TLS.
B. Set the Domain cookie attribute to example.com to limit cookie access to servers in
the same domain.
C. Set the Expires cookie attribute to less than a week.
D. Set the HTTPOnly attribute to require only unencrypted sessions. - Ben’s company has recently retired their fleet of multifunction printers. Their information
security team has expressed concerns that the printers contain hard drives and that they
may still have data from scans and print jobs. What is the technical term for this issue?
A. Data pooling
B. Failed clearing
C. Data permanence
D. Data remanence