Chapter 10 ■ Practice Test 2 233
C. Scan each system using a port scanner.
D. Use device fingerprinting via a web-based registration system.
- David works in an organization that uses a formal data governance program. He is con-
sulting with an employee working on a project that created an entirely new class of data
and wants to work with the appropriate individual to assign a classification level to that
information. Who is responsible for the assignment of information to a classification level?
A. Data creator
B. Data owner
C. CISO
D. Data custodian - What type of inbound packet is characteristic of a ping flood attack?
A. ICMP echo request
B. ICMP echo reply
C. ICMP destination unreachable
D. ICMP route changed - Gabe is concerned about the security of passwords used as a cornerstone of his organiza-
tion’s information security program. Which one of the following controls would provide
the greatest improvement in Gabe’s ability to authenticate users?
A. More complex passwords
B. User education against social engineering
C. Multifactor authentication
D. Addition of security questions based on personal knowledge - The separation of network infrastructure from the control layer, combined with the ability
to centrally program a network design in a vendor-neutral, standards-based implementa-
tion, is an example of what important concept?
A. MPLS, a way to replace long network addresses with shorter labels and support a
wide range of protocols
B. FCoE, a converged protocol that allows common applications over Ethernet
C. SDN, a converged protocol that allows network virtualization
D. CDN, a converged protocol that makes common network designs accessible - Susan is preparing to decommission her organization’s archival DVD-ROMs that contain
Top Secret data. How should she ensure that the data cannot be exposed?
A. Degauss
B. Zero wipe
C. Pulverize
D. Secure erase