Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data from a disaster?
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
Which of the following actions can be performed by using the principle of separation of duties?
Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?
Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?
Which of the following workforces works to handle the incidents in an enterprise?
You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?
In which of the following DRP tests does a business unit management meet to review the plan?
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?
Which of the following processes is used by organizations to set the risk tolerance, identify the potential risks, and prioritize the tolerance for risk?
In which of the following DRP tests does a business unit management meet to review the plan?
You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?
Which of the following cryptographic system services assures the receiver that the received message has not been altered?
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?
Each correct answer represents a part of the solution. Choose three.
Which of the following documents is necessary to continue the business in the event of disaster or emergency?
Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from occurring?
Fill in the blank with the appropriate number:
RAID-________ is a combination of RAID-1 and RAID-0.
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?
John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
Which of the following BCP teams deals with the key decision making and guides recovery teams and business personnel?
You are analyzing accounting information of a company. Which of the following components of configuration management should you use that involves periodic checks to determine the consistency and completeness of accounting information, and to verify that all configuration management policies are being followed?
Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?
Which of the following procedures is designed to contain data, hardware, and software that can be critical for a business?
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?
Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan?
Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?
Which of the following Tier 1 policies will identify who is responsible for what?
Which of the following defines the communication link between a Web server and Web applications?
Which of the following phases is the first step towards creating a business continuity plan?
Which of the following events occurs in a system when there is a TCB failure and the recovery
procedures cannot return the system to a secure state?
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?
Which of the following actions can be performed by using the principle of separation of duties?
Which of the following are some of the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following security procedures is related to the SDLC's implementation?
Which of the following processes acts as a control measure that provides some amount of
protection to the assets?
In which of the following prototyping, a version of the system is built to check the requirements and is then discarded?
Which of the following statements are true about classless routing protocols?
Each correct answer represents a complete solution. Choose two.