Which of the following is a type of security management for computers and networks in order to
identify security breaches?
Question No 2
Which of the following types of firewalls increases the security of data packets by remembering the
state of connection at the network and the session layers as they pass through the filter?
Question No 3
Which of the following federal laws is designed to protect computer data from theft?
Question No 4
Which of the following is used to indicate that the software has met a defined quality level and is
ready for mass distribution either by electronic means or by physical media?
Question No 5
Part of your change management plan details what should happen in the change control system for
your project. Theresa, a junior project manager, asks what the configuration management activities
are for scope changes. You tell her that all of the following are valid configuration management
activities except for which one?