Which of the following risk management techniques is your company using?
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?A . Risk mitigationB . Risk transferC . Risk acceptanceD . Risk avoidanceView...
What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.
What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.A . TroubleshootingB . InvestigationC . UpgradationD . BackupView AnswerAnswer: AB
What will be your answer?
You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?A . It improves the possibility for career...
What type of a document should Ned send to the vendor?
Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document...
What type of security audit do you need to conduct to resolve the problem?
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?A . Operational auditB . Dependent auditC . Non-operational auditD...
Which of the following protocols is used with a tunneling protocol to provide security?
Which of the following protocols is used with a tunneling protocol to provide security?A . FTPB . IPX/SPXC . IPSecD . EAPView AnswerAnswer: C
Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?
Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?A . Gramm-Leach-Bliley ActB . Computer Fraud and Abuse ActC . Computer Security ActD . Digital Millennium Copyright ActView AnswerAnswer: B
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?A . Disaster Recovery PlanB . Continuity of Operations PlanC . Contingency PlanD . Business Continuity PlanView AnswerAnswer: D
What portion of the change control process oversees features and functions of the product scope?
You are documenting your organization's change control procedures for project management. What portion of the change control process oversees features and functions of the product scope?A . Configuration managementB . Product scope management is outside the concerns of the project.C . Scope change control systemD . Project integration managementView AnswerAnswer:...
Which of the following is most appropriate for this client?
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?A ....