3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from occurring?
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?
Fill the appropriate power supply form factor in the blank space.
_________form factor is similar to LPX form factor in physical dimensions.
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?
Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?
In which of the following DRP tests does a business unit management meet to review the plan?
Which of the following system security policies is used to address specific issues of concern to the organization?
Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?
Which of the following processes measures the maturity level of the security program?
Which of the following classification schemes is considered to be of a personal nature and is
intended for company use only?
Which of the following DRP tests is plan distributed, and reviewed by the business units for its
thoroughness and effectiveness?
Which of the following options is an intellectual property right to protect inventions?
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
In risk analysis, which of the following can be identified as a consequence of a disaster?
Drag and drop the appropriate team names in front of their respective responsibilities.
Which of the following security procedures is NOT related to the SDLC's disposition?
Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?
Which of the following phases involves getting the final senior management signoff and creating enterprise-wide awareness of the plan?
You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?
Which of the following backup sites is a replica of the original site of an organization with full computer systems as well as near-complete backups of user data?
Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.
Which of the following Tier 1 policies will identify who is responsible for what?
You are analyzing accounting information of a company. Which of the following components of configuration management should you use that involves periodic checks to determine the consistency and completeness of accounting information, and to verify that all configuration management policies are being followed?
Which of the following should the administrator ensure during the test of a disaster recovery plan?
ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about disaster recovery plan documentation are true?
Each correct answer represents a complete solution. Choose all that apply.
Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project?
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries at the time of disaster recovery?
A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?
You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?
Which of the following parts of BS 7799 covers risk analysis and management?
In which of the following managing styles does the manager supervise subordinates very closely and give detail directions?
In risk analysis, which of the following can be identified as a consequence of a disaster?
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?