Mirroring, shadowing, and duplexing provide application system redundancy, not network redundancy. Mirroring refers to copying data as it is written from one device or machine to another. Shadowing is where information is written in two places, one shadowing the other, for extra protection. Any changes made will be reflected in both places. Journaling is a chronological description of transactions that have taken place, either locally, centrally, or remotely.
120. Which of the following controls prevents a loss of data integrity in a local-area-network (LAN) environment?
a.
Data mirroring and archivingb.
Data correctionc.
Data vaultingd.
Data backupData correction is incorrect because it is an example of a corrective control where bad data is fixed. Data vaulting is incorrect because it is an example of corrective control. It is a way of storing critical data offsite either electronically or manually. Data backup is incorrect because it is an example of corrective control where a compromised system can be restored.
121. In general, a fail-over mechanism is an example of which of the following?
a.
Corrective controlb.
Preventive controlc.
Recovery controld.
Detective control122. Which of the following does
a.
Malwareb.
Web browsersc.
Zombie programsd.
E-mail attachmentsWith zero-day (zero-hour) attacks, attackers try to exploit computer application vulnerabilities that are unknown to system owners and system administrators, undisclosed to software vendors, or for which no security fix is available. Malware writers can exploit zero-day vulnerabilities through several different attack vectors to compromise attacked systems or steal confidential data. Web browsers are a major target because of their widespread distribution and usage. Hackers send e-mail attachments to exploit vulnerabilities in the application opening the attachment and send other exploits to take advantage of weaknesses in common file types.
123. TEMPEST is used for which of the following?
a.
To detect electromagnetic disclosuresb.
To detect electronic dependenciesc.
To detect electronic destructionsd.
To detect electromagnetic emanations124. Which of the following is an example of directive controls?
a.
Passwords and firewallsb.
Key escrow and software escrowc.
Intrusion detection systems and antivirus softwared.
Policies and standards125. Which of the following control terms can be used in a broad sense?
a.
Administrative controlsb.
Operational controlsc.
Technical controlsd.
Management controls