Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?A . PatentB . Utility modelC . SnoopingD . CopyrightView AnswerAnswer: A

August 6, 2020 No Comments READ MORE +

What is this called?

You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?A . AvailabilityB . EncryptionC . IntegrityD . ConfidentialityView AnswerAnswer: D

August 5, 2020 No Comments READ MORE +

Where should you document the proposed responses and the current status of all identified risks?

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?A . Risk management planB ....

August 5, 2020 No Comments READ MORE +

Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?

Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?A . HIPAAB . COPPAC . FERPAD . GLBAView AnswerAnswer: C

August 5, 2020 No Comments READ MORE +

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."A . Monitor and Control RisksB . Identify RisksC . Perform Qualitative Risk AnalysisD...

August 5, 2020 No Comments READ MORE +

Which of the following security models dictates that subjects can only access objects through applications?

Which of the following security models dictates that subjects can only access objects through applications?A . Biba-Clark modelB . Bell-LaPadulaC . Clark-WilsonD . Biba modelView AnswerAnswer: C

August 5, 2020 No Comments READ MORE +

Which of the following is/are a type of electronic communication?

Electronic communication technology refers to technology devices, such as computers and cell phones, used to facilitate communication. Which of the following is/are a type of electronic communication? Each correct answer represents a complete solution. Choose all that apply.A . Internet telephonyB . Instant messagingC . Electronic mailD . Post-it noteE...

August 4, 2020 No Comments READ MORE +

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.A . Vulnerability Assessment and Penetration TestingB . Security Certification and Accreditation (C&A)C . Change and Configuration ControlD . Risk...

August 4, 2020 No Comments READ MORE +

Which of the following laws are used to protect a part of software?

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?A . Code Security lawB . Trademark lawsC . Copyright...

August 4, 2020 No Comments READ MORE +

Which of the following penetration testing phases involves reconnaissance or data gathering?

Which of the following penetration testing phases involves reconnaissance or data gathering?A . Attack phaseB . Pre-attack phaseC . Post-attack phaseD . Out-attack phaseView AnswerAnswer: B

August 4, 2020 No Comments READ MORE +