Chapter 12 ■ Practice Test 4 303
C. Vulnerability assessment tools
D. Penetration testing methodologies
- What is the highest level of the military classification scheme?
A. Secret
B. Confidential
C. SBU
D. Top S e c re t
- In what type of trusted recovery process does the system recover against one or more fail-
ure types without administrator intervention while protecting itself against data loss?
A. Automated recovery
B. Manual recovery
C. Function recovery
D. Automated recovery without undue data loss - What three important items should be considered if you are attempting to control the
strength of signal for a wireless network as well as where it is accessible?
A. Antenna placement, antenna type, antenna power levels
B. Antenna design, power levels, use of a captive portal
C. Antenna placement, antenna design, use of a captive portal
D. Power levels, antenna placement, FCC minimum strength requirements - What is the best way to ensure that data is unrecoverable from a SSD?
A. Use the built-in erase commands
B. Use a random pattern wipe of 1s and 0s
C. Physically destroy the drive
D. Degauss the drive
7 7. Alice sends a message to Bob and wants to ensure that Mal, a third party, does not read
the contents of the message while in transit. What goal of cryptography is Alice attempting
to achieve?
A. Confidentiality
B. Integrity
C. Authentication
D. Nonrepudiation