Which of the following individuals inspects whether the security policies, standards, guidelines, and procedures are efficiently performed in accordance with the company's stated security objectives?

Which of the following individuals inspects whether the security policies, standards, guidelines, and procedures are efficiently performed in accordance with the company's stated security objectives?A . Information system security professionalB . Data ownerC . Senior managementD . Information system auditorView AnswerAnswer: D Explanation: An information system auditor is an individual...

November 1, 2020 No Comments READ MORE +

What will be the annualized loss expectancy in her project?

Della work as a project manager for BlueWell Inc. A threat with a dollar value of $250,000 is expected to happen in her project and the frequency of threat occurrence per year is 0.01. What will be the annualized loss expectancy in her project?A . $2,000B . $2,500C . $3,510D...

October 31, 2020 No Comments READ MORE +

You work as the senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?

You work as the senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes...

October 31, 2020 No Comments READ MORE +

Which of the following disadvantages does it include?

The NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on Cloud Computing and Standards" specifies potential advantages and disdvantages of virtualization. Which of the following disadvantages does it include? Each correct answer represents a complete solution. Choose all that apply.A . It increases capabilities for fault tolerant computing...

October 31, 2020 No Comments READ MORE +

Which of the following refers to the above mentioned condition?

You have a storage media with some data and you make efforts to remove this data. After performing this, you analyze that the data remains present on the media. Which of the following refers to the above mentioned condition?A . Object reuseB . DegaussingC . ResidualD . Data remanenceView AnswerAnswer:...

October 31, 2020 No Comments READ MORE +

Which of the following life cycle modeling activities establishes service relationships and message exchange paths?

Which of the following life cycle modeling activities establishes service relationships and message exchange paths?A . Service-oriented logical design modelingB . Service-oriented conceptual architecture modelingC . Service-oriented discovery and analysis modelingD . Service-oriented business integration modelingView AnswerAnswer: A Explanation: The service-oriented logical design modeling establishes service relationships and message exchange...

October 31, 2020 No Comments READ MORE +

You tell her that all of the following are valid configuration management activities except for which one?

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?A...

October 31, 2020 No Comments READ MORE +

Which of the following statements are true about ISSO and ISSE?

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that apply.A . An ISSE manages the security of...

October 31, 2020 No Comments READ MORE +

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls?

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls?A . Information Assurance (IA)B . Information systems security engineering (ISSE)C . Certification and accreditation (C&A)D . Risk ManagementView AnswerAnswer: C Explanation: Certification and accreditation (C&A)...

October 31, 2020 No Comments READ MORE +

On the grounds of which of the following laws can the employee be prosecuted?

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of...

October 30, 2020 No Comments READ MORE +