What type of document contains information on alternative business locations, IT resources, and personnel?
Answer : E
Distinguish between the role of the data owner and the role of the data custodian. Complete the following sentence. The data owner is the:
Answer : C
Which of the following is NOT a concern for enterprise physical security?
Answer : A
A(n) _____________ is a quantitative review of risks, to determine how an organization continue to function, in the event a risk is realized. .
Answer : C
A(n)___________ is a one-way mathematical function that maps variable values into smaller values of a fixed length.
Answer : D
At ABC Corporation, access to critical information resources, such as database and e-mail servers, is controlled by the information-technology (IT) department. The supervisor in the department grants access to printers where the printer is located. Managers grant and revoke rights to files within their departments' directories on the file server, but the IT department controls who has access to the directories. Which type of access-management system is in use at ABC Corporation?
Answer : C
One individual is selected from each department, to attend a security-awareness course. Each person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this?
Answer : C
Which of the following are common failures that should be addressed in an (BCP) ? (Choose THREE.)
Answer : ACD
Which of the following is an example of a simple, physical-access control?
Answer : A
Which of the following should be included in an enterprise Business Continuity Plan (BCP)? (Choose THREE.)
Answer : ABE
A __________ posture provides many levels of security possibilities, for access control.
Answer : A
A(n) ___________ is the first step for determining which technical information assets should be protected.
Answer : A
Which of the following statements about the maintenance and review of information security policies is NOT true?
Answer : D
_________ is a type of cryptography, where letters of an original message are systematically rearranged into another sequence.
Answer : C
A(n) __________ is an abstract machine, which mediates all access subjects have to objects.
Answer : B
Have any questions or issues ? Please dont hesitate to contact us