Which of the following are the responsibilities of a custodian with regard to data in an information classific
Which of the following are the responsibilities of a custodian with regard to data in an information
classification program? Each correct answer represents a complete solution. Choose three.
Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?
Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?
Each correct answer represents a complete solution. Choose two.
which of the following US laws will john be charged?
John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the
following US laws will john be charged?
Which of the following statements are true about a hot site?
Which of the following statements are true about a hot site?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are some of its critical steps?
NIST Special Publication 800-50 is a security awareness program. It is designed for those people who
are currently working in the information technology field and want information on security policies.
Which of the following are some of its critical steps?
Each correct answer represents a complete solution. Choose two.
Which one of the following contract types is usually considered to be the most dangerous for the buyer?
You are the program manager for your project. You are working with the project managers
regarding the procurement processes for their projects. You have ruled out one particular contract
type because it is considered too risky for the program. Which one of the following contract types is
usually considered to be the most dangerous for the buyer?
What is the most cost effective method to prevent this?
You are the Network Administrator for a college. You watch a large number of people (some not
even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You
have had a problem with laptops being stolen. What is the most cost effective method to prevent
this?
Which of the following is violated in a shoulder surfing attack?
Shoulder surfing is a type of in-person attack in which the attacker gathers information about the
premises of an organization. This attack is often performed by looking surreptitiously at the
keyboard of an employee’s computer while he is typing in his password at any access point such as a
terminal/Web site. Which of the following is violated in a shoulder surfing attack?
Which of the following plans provides procedures for recovering business operations immediately following a di
Which of the following plans provides procedures for recovering business operations immediately
following a disaster?
which is calculated as a percentage of the initial estimated project costs?
In which of the following contract types, the seller is reimbursed for all allowable costs for
performing the contract work and receives a fixed fee payment which is calculated as a percentage
of the initial estimated project costs?