You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?
Answer : C
Which of the following anti-child pornography organizations helps local communities to create programs and develop strategies to investigate child exploitation?
Answer : B
In which of the following contract types, the seller is reimbursed for all allowable costs for performing the contract work and receives a fixed fee payment which is calculated as a percentage of the initial estimated project costs?
Answer : B
Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?
Answer : C
Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?
Answer : A
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
Answer : A
Mark works as a security manager for SoftTech Inc. He is involved in the BIA phase to create a document to be used to help understand what impact a disruptive event would have on the business. The impact might be financial or operational. Which of the following are the objectives related to the above phase in which Mark is involved? Each correct answer represents a part of the solution. Choose three.
Answer : ABC
Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.
Answer : B,C,D
Which of the following sites are similar to the hot site facilities, with the exception that they are completely dedicated, self-developed recovery facilities?
Answer : D
Which of the following rated systems of the Orange book has mandatory protection of the
TCB?
Answer : A
Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
Answer : A
Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?
Answer : A
Which of the following are the examples of administrative controls? Each correct answer represents a complete solution. Choose all that apply.
Answer : AB
Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?
Answer : B
You work as the Network Administrator for a defense contractor. Your company works with sensitive materials and all IT personnel have at least a secret level clearance. You are still concerned that one individual could perhaps compromise the network (intentionally or unintentionally) by setting up improper or unauthorized remote access. What is the best way to avoid this problem?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us