An advantage of virtualizing servers, databases, and office applications is:
An advantage of virtualizing servers, databases, and office applications is:
which of the following tasks?
Key elements of a business impact analysis should include which of the following tasks?
Which of the following is the ALE for the company?
A security administrator is tasked with calculating the total ALE on servers. In a two year period of time, a
company has to replace five servers. Each server replacement has cost the company $4,000 with
downtime costing $3,000. Which of the following is the ALE for the company?
Which of the following would include the MOST detail on these objectives?
In the case of a major outage or business interruption, the security office has documented the expected
loss of earnings, potential fines and potential consequence to customer service. Which of the following
would include the MOST detail on these objectives?
Which of the following would BEST be used to calculate the expected loss of an event, if the likelihood of an
Which of the following would BEST be used to calculate the expected loss of an event, if the likelihood of
an event occurring is known? (Select TWO).
Which of the following documents is the CIO MOST likely updating?
A company’s chief information officer (CIO) has analyzed the financial loss associated with the company’s
database breach. They calculated that one single breach could cost the company $1,000,000 at a
minimum. Which of the following documents is the CIO MOST likely updating?
A network administrator has recently updated their network devices to ensure redundancy is in place so that:
A network administrator has recently updated their network devices to ensure redundancy is in place so
that:
Which of the following is MOST likely the reason for this recommendation?
After an assessment, auditors recommended that an application hosting company should contract with
additional data providers for redundant high speed Internet connections. Which of the following is MOST
likely the reason for this recommendation? (Select TWO).
Which of the following utilities can be used in Linux to view a list of users’ failed authentication attempt
Which of the following utilities can be used in Linux to view a list of users’ failed authentication attempts?
Which of the following risks could IT management be mitigating by removing an all-in-one device?
Which of the following risks could IT management be mitigating by removing an all-in-one device?
