Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?

Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?A . Cold sites arrangementB . Business impact analysisC . Duplicate processing facilitiesD . Reciprocal agreementsView AnswerAnswer: D

August 10, 2020 No Comments READ MORE +

Which of the following steps is the initial step in developing an information security strategy?

Which of the following steps is the initial step in developing an information security strategy?A . Perform a technical vulnerabilities assessment.B . Assess the current levels of security awareness.C . Perform a business impact analysis.D . Analyze the current business strategy.View AnswerAnswer: D

August 9, 2020 No Comments READ MORE +

Which of the following relies on a physical characteristic of the user to verify his identity?

Which of the following relies on a physical characteristic of the user to verify his identity?A . Social EngineeringB . Kerberos v5C . BiometricsD . CHAPView AnswerAnswer: C

August 9, 2020 No Comments READ MORE +

Which of the following subphases are defined in the maintenance phase of the life cycle models?

Which of the following subphases are defined in the maintenance phase of the life cycle models?A . Change controlB . Configuration controlC . Request controlD . Release controlView AnswerAnswer: ACD

August 9, 2020 No Comments READ MORE +

Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities

SIMULATION Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities.View AnswerAnswer: Life cycle

August 8, 2020 No Comments READ MORE +

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.A . IP spoofingB . Broadcast stormC . Password sniffingD . DoS attackView AnswerAnswer: AC

August 8, 2020 No Comments READ MORE +

Which of the following policies helps reduce the potential damage from the actions of one person?

Which of the following policies helps reduce the potential damage from the actions of one person?A . CSAB . Risk assessmentC . Separation of dutiesD . Internal auditView AnswerAnswer: C

August 8, 2020 No Comments READ MORE +

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.A . It ensures that unauthorized modifications are not made to data by authorized personnel or processes.B . It determines the actions and behaviors of a single...

August 8, 2020 No Comments READ MORE +

Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?

Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?A . Managed levelB . Defined levelC . Fundamental levelD . Repeatable levelView AnswerAnswer: C

August 8, 2020 No Comments READ MORE +

In which of the following types of office sites is he working?

Mark works as a security manager for SofTech Inc. He is working in a partially equipped office space which contains some of the system hardware, software, telecommunications, and power sources. In which of the following types of office sites is he working?A . Mobile siteB . Warm siteC . Cold...

August 8, 2020 No Comments READ MORE +