In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?

In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?A . CommunicationB . PlanningC . RecoveryD . EscalationView AnswerAnswer: A

May 31, 2022 No Comments READ MORE +

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?A . Examine the device for physical tamperingB . Implement more stringent baseline configurationsC . Purge or re-image the hard disk driveD . Change access codesView AnswerAnswer: D

May 31, 2022 No Comments READ MORE +

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?A . Take the computer to a forensic labB . Make a copy of the hard driveC . Start documentingD . Turn off the computerView AnswerAnswer: C

May 31, 2022 No Comments READ MORE +

Intellectual property rights are PRIMARY concerned with which of the following?

Intellectual property rights are PRIMARY concerned with which of the following?A . Owner’s ability to realize financial gainB . Owner’s ability to maintain copyrightC . Right of the owner to enjoy their creationD . Right of the owner to control delivery methodView AnswerAnswer: C

May 31, 2022 No Comments READ MORE +

In which of the following programs is it MOST important to include the collection of security process data?

In which of the following programs is it MOST important to include the collection of security process data?A . Quarterly access reviewsB . Security continuous monitoringC . Business continuity testingD . Annual security trainingView AnswerAnswer: B

May 31, 2022 No Comments READ MORE +

Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?

Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?A . Common Vulnerabilities and Exposures (CVE)B . Common Vulnerability Scoring System (CVSS)C . Asset Reporting Format (ARF)D . Open Vulnerability and Assessment Language (OVAL)View AnswerAnswer: B

May 30, 2022 No Comments READ MORE +

Which of the following mobile code security models relies only on trust?

Which of the following mobile code security models relies only on trust?A . Code signingB . Class authenticationC . SandboxingD . Type safetyView AnswerAnswer: A

May 30, 2022 No Comments READ MORE +

What is the MOST important purpose of testing the Disaster Recovery Plan (DRP)?

What is the MOST important purpose of testing the Disaster Recovery Plan (DRP)?A . Evaluating the efficiency of the planB . Identifying the benchmark required for restorationC . Validating the effectiveness of the planD . Determining the Recovery Time Objective (RTO)View AnswerAnswer: C

May 30, 2022 No Comments READ MORE +

Which of the following failures should the IT manager be concerned with?

A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is preparing a companywide Business Continuity Planning (BCP) . Which of the following failures should the IT manager be concerned with?A . ApplicationB . StorageC . PowerD . NetworkView AnswerAnswer: C

May 30, 2022 No Comments READ MORE +

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?A . Disable all unnecessary servicesB . Ensure chain of custodyC . Prepare another backup of the systemD . Isolate the system from the networkView AnswerAnswer: D

May 30, 2022 No Comments READ MORE +