Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?
Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?A . Cold sites arrangementB . Business impact analysisC . Duplicate processing facilitiesD . Reciprocal agreementsView AnswerAnswer: D
Which of the following steps is the initial step in developing an information security strategy?
Which of the following steps is the initial step in developing an information security strategy?A . Perform a technical vulnerabilities assessment.B . Assess the current levels of security awareness.C . Perform a business impact analysis.D . Analyze the current business strategy.View AnswerAnswer: D
Which of the following relies on a physical characteristic of the user to verify his identity?
Which of the following relies on a physical characteristic of the user to verify his identity?A . Social EngineeringB . Kerberos v5C . BiometricsD . CHAPView AnswerAnswer: C
Which of the following subphases are defined in the maintenance phase of the life cycle models?
Which of the following subphases are defined in the maintenance phase of the life cycle models?A . Change controlB . Configuration controlC . Request controlD . Release controlView AnswerAnswer: ACD
Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities
SIMULATION Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities.View AnswerAnswer: Life cycle
Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.
Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.A . IP spoofingB . Broadcast stormC . Password sniffingD . DoS attackView AnswerAnswer: AC
Which of the following policies helps reduce the potential damage from the actions of one person?
Which of the following policies helps reduce the potential damage from the actions of one person?A . CSAB . Risk assessmentC . Separation of dutiesD . Internal auditView AnswerAnswer: C
Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.
Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.A . It ensures that unauthorized modifications are not made to data by authorized personnel or processes.B . It determines the actions and behaviors of a single...
Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?
Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?A . Managed levelB . Defined levelC . Fundamental levelD . Repeatable levelView AnswerAnswer: C
In which of the following types of office sites is he working?
Mark works as a security manager for SofTech Inc. He is working in a partially equipped office space which contains some of the system hardware, software, telecommunications, and power sources. In which of the following types of office sites is he working?A . Mobile siteB . Warm siteC . Cold...