What are the various Tier 1 activities?

The organization level is the Tier 1 and it addresses risks from an organizational perspective. What are the various Tier 1 activities? Each correct answer represents a complete solution. Choose all that apply.A . The organization plans to use the degree and type of oversight, to ensure that the risk...

October 26, 2020 No Comments READ MORE +

What are the various activities performed in the planning phase of the Software Assurance Acquisition process? Each correct answer represents a complete solution. Choose all that apply.

What are the various activities performed in the planning phase of the Software Assurance Acquisition process? Each correct answer represents a complete solution. Choose all that apply.A . Develop software requirements.B . Implement change control procedures.C . Develop evaluation criteria and evaluation plan.D . Create acquisition strategy.View AnswerAnswer: ACD Explanation:...

October 26, 2020 No Comments READ MORE +

Which of the following coding practices are helpful in simplifying code? Each correct answer represents a complete solution. Choose all that apply.

Which of the following coding practices are helpful in simplifying code? Each correct answer represents a complete solution. Choose all that apply.A . Programmers should use multiple small and simple functions rather than a single complex function.B . Software should avoid ambiguities and hidden assumptions, recursions, and GoTo statements.C ....

October 26, 2020 No Comments READ MORE +

Martha registers a domain named Microsoft.in. She tries to sell it to Microsoft Corporation. The infringement of which of the following has she made?

Martha registers a domain named Microsoft.in. She tries to sell it to Microsoft Corporation. The infringement of which of the following has she made?A . CopyrightB . TrademarkC . PatentD . Intellectual propertyView AnswerAnswer: B Explanation: According to the Lanham Act, domain names fall under trademarks law. A new section...

October 26, 2020 No Comments READ MORE +

What features will you recommend?

You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the following purposes: Analyze the data from different log sources Correlate the events among the log entries Identify and prioritize significant events Initiate responses to events if required One of your log...

October 26, 2020 No Comments READ MORE +

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he perform next?

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications...

October 26, 2020 No Comments READ MORE +