Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.A . Data downloading from the InternetB . File and object accessC . Network logons and logoffsD . Printer accessView AnswerAnswer: BCD

August 1, 2020 No Comments READ MORE +

Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?

Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?A . Initial analysis, request for service, data collection, data reporting, data analysisB . Initial analysis, request for service, data collection, data analysis, data reportingC . Request for service, initial analysis, data collection, data analysis, data...

August 1, 2020 No Comments READ MORE +

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?A . The Configuration ManagerB . The Supplier ManagerC . The Service Catalogue ManagerD . The IT Service Continuity ManagerView AnswerAnswer: B

August 1, 2020 No Comments READ MORE +

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.A . EditorB . CustodianC . OwnerD . Security auditorE . UserView AnswerAnswer: BCDE

August 1, 2020 No Comments READ MORE +

Which of the following steps of an incident handling process was performed by the incident response team?

You work as a Senior Marketing Manger for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company....

July 31, 2020 No Comments READ MORE +

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?A . Malicious Communications Act (1998)B . Anti-Cyber-Stalking law (1999)C . Stalking Amendment Act (1999)D . Stalking by Electronic Communications Act (2001)View AnswerAnswer: C

July 31, 2020 No Comments READ MORE +

A contract cannot have provisions for which one of the following?

A contract cannot have provisions for which one of the following?A . Subcontracting the workB . Penalties and fines for disclosure of intellectual rightsC . A deadline for the completion of the workD . Illegal activitiesView AnswerAnswer: D

July 31, 2020 No Comments READ MORE +

According to the change management plan what subsystem will need to manage this change request?

You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be...

July 31, 2020 No Comments READ MORE +

What is a stakeholder analysis chart?

What is a stakeholder analysis chart?A . It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.B . It is a matrix that identifies all of the stakeholders and to whom they must report to.C . It is a matrix that documents the stakeholders' requirements, when the...

July 30, 2020 No Comments READ MORE +

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?A . PROTECT ActB . Sexual Predators ActC ....

July 30, 2020 No Comments READ MORE +