In order to assure uptime for business-critical connections, organizations rely on which of the following?

In order to assure uptime for business-critical connections, organizations rely on which of the following?A . A Memorandum of Agreement (MOA)B . A Service Level Agreement (SLA)C . A Non-Disclosure Agreement (NDA)D . A Request for Proposal (RFP)View AnswerAnswer: B

March 28, 2019 No Comments READ MORE +

When implementing a data classification program, why is it important to avoid too much granularity?

When implementing a data classification program, why is it important to avoid too much granularity?A . The process will require too many resourcesB . It will be difficult to apply to both hardware and softwareC . It will be difficult to assign ownership to the dataD . The process will...

March 28, 2019 No Comments READ MORE +

An organization follows written procedures established for data handling and documentation of process ownership. This is an example of which one of the following types of controls?

An organization follows written procedures established for data handling and documentation of process ownership. This is an example of which one of the following types of controls?A . RecoveryB . CorrectiveC . DetectiveD . PreventativeView AnswerAnswer: D

March 28, 2019 No Comments READ MORE +

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?A . Take the computer to a forensic labB . Make a copy of the hard driveC . Start documentingD . Turn off the computerView AnswerAnswer: C

March 28, 2019 No Comments READ MORE +

Which of the following BEST describes information security policies?

Which of the following BEST describes information security policies?A . Policies are guidelines that describe the best security practices in the industry.B . Policies are high-level procedures that describe the information security approaches.C . Policies provide the blueprints for the information security implementation program.D . Policies are high-level statements that...

March 28, 2019 No Comments READ MORE +

What is the MOST important consideration from a data security perspective when an organization plans to relocate?

What is the MOST important consideration from a data security perspective when an organization plans to relocate?A . Ensure the fire prevention and detection systems are sufficient to protect personnelB . Review the architectural plans to determine how many emergency exits are presentC . Conduct a gap analysis of a...

March 28, 2019 No Comments READ MORE +

A significant action has a state that enables actions on an ADP system to be traced to individuals who may then be held responsible.

A significant action has a state that enables actions on an ADP system to be traced to individuals who may then be held responsible. The action does NOT include:A . Violations of security policy.B . Attempted violations of security policy.C . Non-violations of security policy.D . Attempted violations of allowed...

March 28, 2019 1 Comment READ MORE +

Which of the following is implemented through scripts or smart agents that replays the users multiple log-ins against authentication servers to verify a user's identity which permit access to system services?

Which of the following is implemented through scripts or smart agents that replays the users multiple log-ins against authentication servers to verify a user's identity which permit access to system services?A .  Single Sign-OnB .  Dynamic Sign-OnC .  Smart cardsD .  KerberosView AnswerAnswer: A Explanation: SSO can be implemented by using...

March 28, 2019 No Comments READ MORE +

What will the organization achieve by running multiple parallel instances of the database directed at a single data store?

FOR THIS QUESTION, REFER TO THE FOLLOWING INFORMATION Timeline of Events Figure 1 A system administrator upgrades software that shares the organization’s mission critical database system. The upgrade modifies shared support files used by the database. As a result, the data store becomes corrupted, and the system crashes and fails....

March 28, 2019 No Comments READ MORE +

Separation of duty can be:

Separation of duty can be:A . Dynamic onlyB . EncryptedC . Static onlyD . Static or dynamicView AnswerAnswer: D

March 27, 2019 No Comments READ MORE +