172 Chapter 7 ■ Security Operations (Domain 7)
- Carolyn is concerned that users on her network may be storing sensitive information, such
as Social Security numbers, on their hard drives without proper authorization or security
controls. What technology can she use to best detect this activity?
A. IDS
B. IPS
C. DLP
D. TLS - Under what type of software license does the recipient of software have an unlimited right
to copy, modify, distribute, or resell a software package?
A. GNU Public License
B. Freeware
C. Open source
D. Public domain - In what type of attack do attackers manage to insert themselves into a connection between
a user and a legitimate website?
A. Man-in-the-middle
B. Fraggle
C. Wardriving
D. Meet-in-the-middle - Which one of the following techniques uses statistical methods to select a small number
of records from a large pool for further analysis with the goal of choosing a set of records
that is representative of the entire pool?
A. Clipping
B. Randomization
C. Sampling
D. Selection - Which one of the following controls protects an organization in the event of a sustained
period of power loss?
A. Redundant servers
B. Uninterruptible power supply (UPS)
C. Generator
D. RAID - What concept from the Federal Rules of Civil Procedure (FCRP) helps to ensure that addi-
tional time and expense are not incurred as part of electronic discovery when the benefits
do not outweigh the costs?
A. Tool-assisted review
B. Cooperation