Which of the following is the most secure method of authentication?
Which of the following is the most secure method of authentication?
Which of the following testing approaches will she apply to accomplish this task?
Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been
tasked to perform network security testing to find out the vulnerabilities and shortcomings of the
present network infrastructure. Which of the following testing approaches will she apply to
accomplish this task?
Which of the following processes identifies the threats that can impact the business continuity of operations?
Which of the following processes identifies the threats that can impact the business continuity of
operations?
What are the process activities of this phase?
The Phase 3 of DITSCAP C&A is known as Validation. The goal of Phase 3 is to validate that the
preceding work has produced an IS that operates in a specified computing environment. What are
the process activities of this phase? Each correct answer represents a complete solution. Choose
all that apply.
Which of the following methods is a means of ensuring that system changes are approved before being implemente
Which of the following methods is a means of ensuring that system changes are approved before
being implemented, only the proposed and approved changes are implemented, and the
implementation is complete and accurate?
What are the objectives of a security program?
Information Security management is a process of defining the security controls in order to protect
information assets. The first action of a management program to implement information security is
to have a security program in place. What are the objectives of a security program? Each correct
answer represents a complete solution. Choose all that apply.
What NIACAP certification levels are recommended by the certifier?
What NIACAP certification levels are recommended by the certifier? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an e
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it
against an established baseline?
Which of the following characteristics are described by the DIAP Information Readiness Assessment function?
Which of the following characteristics are described by the DIAP Information Readiness
Assessment function? Each correct answer represents a complete solution. Choose all that apply.
What risk response is the most appropriate for this instance?
Rob is the project manager of the IDLK Project for his company. This project has a budget of
$5,600,000 and is expected to last 18 months. Rob has learned that a new law may affect how the
project is allowed to proceed – even though the organization has already invested over $750,000
in the project. What risk response is the most appropriate for this instance?