238 Chapter 10 ■ Practice Test 2
- George is assisting a prosecutor with a case against a hacker who attempted to break into
the computer systems at George’s company. He provides system logs to the prosecutor for
use as evidence, but the prosecutor insists that George testify in court about how he gath-
ered the logs. What rule of evidence requires George’s testimony?
A. Testimonial evidence rule
B. Parol evidence rule
C. Best evidence rule
D. Hearsay rule - Which of the following is not a valid use for key risk indicators?
A. Provide warnings before issues occur.
B. Provide real-time incident response information.
C. Provide historical views of past risks.
D. Provide insight into risk tolerance for the organization. - Which one of the following malware types uses built-in propagation mechanisms that
exploit system vulnerabilities to spread?
A. Trojan horse
B. Worm
C. Logic bomb
D. Virus - Don’s company is considering the use of an object-based storage system where data is
placed in a vendor-managed storage environment through the use of API calls. What type
of cloud computing service is in use?
A. IaaS
B. PaaS
C. CaaS
D. SaaS - In what model of cloud computing do two or more organizations collaborate to build a
shared cloud computing environment that is for their own use?
A. Public cloud
B. Private cloud
C. Community cloud
D. Shared cloud - Which one of the following is not a principle of the Agile approach to software
development?
A. The most efficient method of conveying information is electronic.
B. Working software is the primary measure of progress.
C. Simplicity is essential.
D. Businesspeople and developers must work together daily.