In Disaster Recovery (DR) and Business Continuity (DC) training, which BEST describes a functional drill?
In Disaster Recovery (DR) and Business Continuity (DC) training, which BEST describes a functional drill?A . a functional evacuation of personnelB . a specific test by response teams of individual emergency response functionsC . an activation of the backup siteD . a full-scale simulation of an emergency and the subsequent...
Which of the following is MOST effective to mitigate future infections?
A user has infected a computer with malware by connecting a Universal Serial Bus (USB) storage device. Which of the following is MOST effective to mitigate future infections?A . Develop a written organizational policy prohibiting unauthorized USB devicesB . Train users on the dangers of transferring data in USB devicesC...
Which of the following is a direct monetary cost of a security incident?
Which of the following is a direct monetary cost of a security incident?A . MoraleB . ReputationC . EquipmentD . InformationView AnswerAnswer: C
Which of the following is an initial consideration when developing an information security management system?
Which of the following is an initial consideration when developing an information security management system?A . Identify the contractual security obligations that apply to the organizationsB . Understand the value of the information assetsC . Identify the level of residual risk that is tolerable to managementD . Identify relevant legislative...
Why is planning in Disaster Recovery (DR) an interactive process?
Why is planning in Disaster Recovery (DR) an interactive process?A . It details off-site storage plansB . It identifies omissions in the planC . It defines the objectives of the planD . It forms part of the awareness processView AnswerAnswer: B
When determining who can accept the risk associated with a vulnerability, which of the following is MOST important?
When determining who can accept the risk associated with a vulnerability, which of the following is MOST important?A . Countermeasure effectivenessB . Type of potential lossC . Incident likelihoodD . Information ownershipView AnswerAnswer: C
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?A . Implementation PhaseB . Initialization PhaseC . Cancellation PhaseD . Issued PhaseView AnswerAnswer: D
Unused space in a disk cluster is important in media analysis because it may contain which of the following?
Unused space in a disk cluster is important in media analysis because it may contain which of the following?A . Residual data that has not been overwrittenB . Hidden viruses and Trojan horsesC . Information about the File Allocation table (FAT)D . Information about patches and upgrades to the systemView...
Which of the following is BEST achieved through the use of eXtensible Access Markup Language (XACML)?
Which of the following is BEST achieved through the use of eXtensible Access Markup Language (XACML)?A . Minimize malicious attacks from third partiesB . Manage resource privilegesC . Share digital identities in hybrid cloudD . Defined a standard protocolView AnswerAnswer: D
In a data classification scheme, the data is owned by the
In a data classification scheme, the data is owned by theA . system security managersB . business managersC . Information Technology (IT) managersD . end usersView AnswerAnswer: B