Worms take over computer memory and deny its use to legitimate programs.
Worms take over computer memory and deny its use to legitimate programs.A . TrueB . FalseView AnswerAnswer: A
A good risk management program involves:
A good risk management program involves:A . Identify risks or specific vulnerabilitiesB . Analyze and study risks, including likelihood and degree of danger of an eventC . Study of security programsD . All of the aboveView AnswerAnswer: D
What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?
What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?A . Strict liabilityB . PlaintiffC . DefendantD . None of the aboveView AnswerAnswer: A
The classic triangle frequently referred to in describing the nature of fire consists of:
The classic triangle frequently referred to in describing the nature of fire consists of:A . heat, fuel, oxygenB . heat, light, oxygenC . heat, smoke, oxygenD . heat, carbon dioxide, oxygenView AnswerAnswer: A
The purpose of methodical examination is to:
The purpose of methodical examination is to:A . Find deviations from established security standards and practicesB . Find loopholes in security controlsC . consider means of improving the efficiency or control of the operation without reducing securityD . All of the aboveView AnswerAnswer: D
Which of the following is the most widely accepted classification of skills for the leadership?
Which of the following is the most widely accepted classification of skills for the leadership?A . Skill MixB . ConceptualC . Human relationsD . All of the aboveView AnswerAnswer: D
Contingency planning is the result of which four major components?
Contingency planning is the result of which four major components?A . emergency response, crisis management, pressure devices, risk analysisB . emergency response, crisis management, business recovery, business resumptionC . basic planning, crisis management, business recovery, business resumptionD . under investigation, crisis management, business recovery, pressure devicesView AnswerAnswer: B
What is a feeling of responsibility and respect that develops during an individual’s formative years and is subconscious?
What is a feeling of responsibility and respect that develops during an individual’s formative years and is subconscious?A . Moral honestyB . TrustworthinessC . IntegrityD . CandorView AnswerAnswer: A
A hybrid system is a combination of:
A hybrid system is a combination of:A . Security & ControlB . Standard & Security actsC . Security consultants & servicesD . Proprietary & Contract securityView AnswerAnswer: D
What considers all aspects of the security operation on a continuing basis?
What considers all aspects of the security operation on a continuing basis?A . Security VulnerabilityB . Data-security ActC . Inspection criterionD . Operational AuditView AnswerAnswer: D