Enjoy 15% Discount With Coupon 15off

Monthly Archives - December 2022

Which of the following represents the missing factor in this formula?

A common formula used to calculate risk is:+ Threats + Vulnerabilities = Risk. Which of the following represents the missing factor in this formula?A . Exploits B. Security C. Asset D. ProbabilityView AnswerAnswer: C Explanation: Reference: https://www.threatanalysis.com/2010/05/03/threat-vulnerability-risk-commonly-mixed-up-terms/

Read more...

Which of the following should be considered FIRST prior to disposing of the electronic data?

An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets. Which of the following should be considered FIRST prior to disposing of the electronic data?A . Sanitization policy B. Data sovereignty C. Encryption policy D. Retention standardsView AnswerAnswer: D

Read more...

Demand management involves which of the following undertakings?

Demand management involves which of the following undertakings?A . Adjusting capacity to support expected demand B. Engaging in activities associated with customer relationship management C. Creating higher customer demand by improving performance in areas such as lead time and service levels D. Understanding events and managing activities that could influence...

Read more...

Which of the following actions should the security administrator take?

According to company policy, all accounts with administrator privileges should have suffix _ja. While reviewing Windows workstation configurations, a security administrator discovers an account without the suffix in the administrator’s group. Which of the following actions should the security administrator take?A . Review the system log on the affected workstation....

Read more...