Which of the following tools will you use to look outside your own organization to examine how others achieve their performance levels, and what processes they use to reach those levels?
You work as a systems engineer for BlueWell Inc. Which of the following tools will you use to look outside your own organization to examine how others achieve their performance levels, and what processes they use to reach those levels?A . BenchmarkingB . Six SigmaC . ISO 9001:2000D . SEI-CMMView...
Which of the following is a variant with regard to Configuration Management?
Which of the following is a variant with regard to Configuration Management?A . A CI that has the same name as another CI but shares no relationship.B . A CI that particularly refers to a software version.C . A CI that has the same essential functionality as another CI but...
Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?
Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?A . Take-Grant Protection ModelB . Biba Integrity ModelC . Bell-LaPadula ModelD . Access MatrixView AnswerAnswer: A Explanation: The take-grant protection...
Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.
Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.A . PhysicalB . TechnicalC . AdministrativeD . AutomaticView AnswerAnswer: ABC Explanation: Security guards, locks on the gates, and alarms come under physical access control. Policies and procedures implemented by an organization...
Which of the following attacks causes software to fail and prevents the intended users from accessing software?
Which of the following attacks causes software to fail and prevents the intended users from accessing software?A . Enabling attackB . Reconnaissance attackC . Sabotage attackD . Disclosure attackView AnswerAnswer: C Explanation: A sabotage attack is an attack that causes software to fail. It also prevents the intended users from...
Drop the appropriate value to complete the formula
DRAG DROP Drop the appropriate value to complete the formula. View AnswerAnswer: Explanation: A Single Loss Expectancy (SLE) is the value in dollar ($) that is assigned to a single event. The SLE can be calculated by the following formula: SLE = Asset Value ($) X Exposure Factor (EF) The...
Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.A . EditorB . CustodianC . OwnerD . UserE . Security auditorView AnswerAnswer: BCDE Explanation: The following are the common roles with regard...
Which of the following statements are true about Certification and Accreditation?
Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation? Each correct answer represents a...
On the grounds of which of the following laws can the employee be prosecuted?
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of...
On the grounds of which of the following laws can the employee be prosecuted?
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of...