Mirroring, shadowing, and duplexing provide application system redundancy, not network redundancy. Mirroring refers to copying data as it is written from one device or machine to another. Shadowing is where information is written in two places, one shadowing the other, for extra protection. Any changes made will be reflected in both places. Journaling is a chronological description of transactions that have taken place, either locally, centrally, or remotely.
120. Which of the following controls prevents a loss of data integrity in a local-area-network (LAN) environment?
a. Data mirroring and archiving
b. Data correction
c. Data vaulting
d. Data backup
Data correction is incorrect because it is an example of a corrective control where bad data is fixed. Data vaulting is incorrect because it is an example of corrective control. It is a way of storing critical data offsite either electronically or manually. Data backup is incorrect because it is an example of corrective control where a compromised system can be restored.
121. In general, a fail-over mechanism is an example of which of the following?
a. Corrective control
b. Preventive control
c. Recovery control
d. Detective control
122. Which of the following does
a. Malware
b. Web browsers
c. Zombie programs
d. E-mail attachments
With zero-day (zero-hour) attacks, attackers try to exploit computer application vulnerabilities that are unknown to system owners and system administrators, undisclosed to software vendors, or for which no security fix is available. Malware writers can exploit zero-day vulnerabilities through several different attack vectors to compromise attacked systems or steal confidential data. Web browsers are a major target because of their widespread distribution and usage. Hackers send e-mail attachments to exploit vulnerabilities in the application opening the attachment and send other exploits to take advantage of weaknesses in common file types.
123. TEMPEST is used for which of the following?
a. To detect electromagnetic disclosures
b. To detect electronic dependencies
c. To detect electronic destructions
d. To detect electromagnetic emanations
124. Which of the following is an example of directive controls?
a. Passwords and firewalls
b. Key escrow and software escrow
c. Intrusion detection systems and antivirus software
d. Policies and standards
125. Which of the following control terms can be used in a broad sense?
a. Administrative controls
b. Operational controls
c. Technical controls
d. Management controls