External consistency ensures that the data stored in the database is:
External consistency ensures that the data stored in the database is:A . in-consistent with the real world.B . remains consistant when sent from one system to another.C . consistent with the logical world.D . consistent with the real world.View AnswerAnswer: D Explanation: External consistency ensures that the data stored in...
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?A . Warm siteB . Hot siteC . Mirror siteD . Cold siteView AnswerAnswer: A
Which of the following is MOST important when assigning ownership of an asset to a department?
Which of the following is MOST important when assigning ownership of an asset to a department?A . The department should report to the business ownerB . Ownership of the asset should be periodically reviewedC . Individual accountability should be ensuredD . All members should be trained on their responsibilitiesView AnswerAnswer:...
The MAIN purpose of a Change Management Policy is to
The MAIN purpose of a Change Management Policy is toA . verify that changes to the Information Technology (IT) infrastructure are approved.B . identify the changes that may be made to the IT infrastructure.C . assure management that changes to the IT infrastructure are necessary.D . determine the necessity for...
Which of the following is the BEST response to the auditor?
An auditor carrying out a compliance audit requests passwords that are encrypted in the system to verify that the passwords are compliant with policy. Which of the following is the BEST response to the auditor?A . Provide the encrypted passwords and analysis tools to the auditor for analysis.B . Analyze...
Employee involuntary termination processing should include
Employee involuntary termination processing should includeA . A list of all passwords used by the individual.B . A report on outstanding projects.C . The surrender of any company identification.D . Signing a non-disclosure agreement.View AnswerAnswer: C
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?A . Lack of software documentationB . License agreements requiring release of modified codeC . Expiration of the license agreementD . Costs associated with support of the softwareView AnswerAnswer: D
What process determines who is trusted for a given purpose?
What process determines who is trusted for a given purpose?A . IdentificationB . AuthorizationC . AuthenticationD . AccountingView AnswerAnswer: B
In which of the following programs is it MOST important to include the collection of security process data?
In which of the following programs is it MOST important to include the collection of security process data?A . Quarterly access reviewsB . Security continuous monitoringC . Business continuity testingD . Annual security trainingView AnswerAnswer: A
Which of the following is true of two-factor authentication?
Which of the following is true of two-factor authentication?A . It uses the RSA public-key signature based on integers with large prime factors.B . It requires two measurements of hand geometry.C . It does not use single sign-on technology.D . It relies on two independent proofs of identity.View AnswerAnswer: D...