CCCure Practice Questions

Exit

Question 1 of 1

  Time Left


0 [{"id":45327,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:05:22","updated_at":"2016-03-17 02:05:22","questionName":"Which of the following is the preferred way to suppress an electrical fire in a data center?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45345,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:24:33","updated_at":"2016-03-17 02:24:33","questionName":"Frame relay and X.25 networks are part of which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":44923,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-16 00:22:24","updated_at":"2016-03-16 00:22:24","questionName":"Out of the steps listed below, which one is not one of the steps conducted during the Business Impact Analysis (BIA)?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45330,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:07:38","updated_at":"2016-03-17 02:07:38","questionName":"What is the name for a substitution cipher that shifts the alphabet by 13 places?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45337,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:13:16","updated_at":"2016-03-17 02:13:16","questionName":"Which of the following concerning the Rijndael block cipher algorithm is FALSE?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60417,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:14:28","updated_at":"2016-04-29 01:14:28","questionName":"Which of the following statements relating to the Biba security model is FALSE?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":60418,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-04-29 01:16:23","updated_at":"2016-04-29 01:16:23","questionName":"Which access control model would a lattice-based access control model be an example of?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45333,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:09:55","updated_at":"2016-03-17 02:09:55","questionName":"A one-way hash provides MOST OFTEN which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45349,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:28:34","updated_at":"2016-03-17 02:28:34","questionName":"On which of the following protocols does the tool Firewalk or the technique Firewalking primarily rely on?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":44926,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-16 00:24:56","updated_at":"2016-03-16 00:24:56","questionName":"Which of the following should NOT be a role of the Security Administrator?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45332,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:09:04","updated_at":"2016-03-17 02:09:04","questionName":"Which of the following is NOT a known type of Message Authentication Code (MAC)?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45346,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:25:33","updated_at":"2016-03-17 02:25:33","questionName":"Which of the following is an example of an active attack?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":44929,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-16 00:26:37","updated_at":"2016-03-16 00:26:37","questionName":"Which of the following focuses on sustaining an organization's business functions during and after a disruption?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45351,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:29:46","updated_at":"2016-03-17 02:29:46","questionName":"Which of the following PBX feature supports shared extensions among several devices, ensuring that only one device at a time can use an extension?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":45329,"quiz_id":"3153","answer_id":null,"answerType_id":"0","created_at":"2016-03-17 02:06:35","updated_at":"2016-03-17 02:06:35","questionName":"Common Criteria has assurance level from EAL 1 to EAL 7 regarding the depth of design and testing. Which of the following assure the Target of Evaluation (or TOE) is methodically designed, tested and reviewed?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
45327
0
120
block

Which of the following is the preferred way to suppress an electrical fire in a data center?

Select the correct answer(s).  

(0/0)












45345
0
120
none
44923
0
120
none
45330
0
120
none
45337
0
120
none
60417
0
120
none
60418
0
120
none
45333
0
120
none
45349
0
120
none
44926
0
120
none
45332
0
120
none
45346
0
120
none
44929
0
120
none
45351
0
120
none
45329
0
120
none