which of the following types of tests are the disaster recovery checklists distributed to the members of disas
In which of the following types of tests are the disaster recovery checklists distributed to the
members of disaster recovery team and asked to review the assigned checklist?
models address specifications, requirements, design, verification and validation, and maintenance activities
Fill in the blank with an appropriate phrase. models address specifications, requirements, design,
verification and validation, and maintenance activities.
Which of the following security design patterns provides an alternative by requiring that a user’s authe
Which of the following security design patterns provides an alternative by requiring that a user’s
authentication credentials be verified by the database before providing access to that user’s data?
which a business process must be restored after a disaster in order to avoid unacceptable consequences associa
Which of the following is the duration of time and a service level within which a business process
must be restored after a disaster in order to avoid unacceptable consequences associated with a
break in business continuity?
Which of the following processes culminates in an agreement between key players that a system in its current c
Which of the following processes culminates in an agreement between key players that a system
in its current configuration and operation provides adequate protection controls?
which of the following laws can the employee be prosecuted?
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United
States. A project has been assigned to him to investigate a case of a disloyal employee who is
suspected of stealing design of the garments, which belongs to the company and selling those
garments of the same design under different brand name. Adam investigated that the company
does not have any policy related to the copy of design of the garments. He also investigated that
the trademark under which the employee is selling the garments is almost identical to the original
trademark of the company. On the grounds of which of the following laws can the employee be
prosecuted?
which of the following tasks should he perform next?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of
active systems Location of open ports and applications Now, which of the following tasks should
he perform next?
Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SS
Which of the following DITSCAP C&A phases takes place between the signing of the initial version
of the SSAA and the formal accreditation of the system?
which of the following testing methodologies do assessors use all available documentation and work under no co
In which of the following testing methodologies do assessors use all available documentation and
work under no constraints, and attempt to circumvent the security features of an information
system?
what processes they use to reach those levels?
You work as a systems engineer for BlueWell Inc. Which of the following tools will you use to look
outside your own organization to examine how others achieve their performance levels, and what
processes they use to reach those levels?