Which of the following are the benefits of implementing IT Service Continuity Management?
IT Service Continuity Management (ITSCM) is used to support the overall Business Continuity
Management (BCM) in order to ensure that the required IT infrastructure and the IT service
provision are recovered within an agreed business time scales. Which of the following are the
benefits of implementing IT Service Continuity Management?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following phases in the Incident handling process will utilize the signature to resolve this inci
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident
in the network of your company. You develop a signature based on the characteristics of the
detected virus. Which of the following phases in the Incident handling process will utilize the
signature to resolve this incident?
Which of the following is established during the Business Impact Analysis by the owner of a process in accepte
Which of the following is established during the Business Impact Analysis by the owner of a
process in accepted business continuity planning methodology?
Which of the following options is an intellectual property right to protect inventions?
Which of the following options is an intellectual property right to protect inventions?
Which of the following techniques will he use to fulfill this requirement?
Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic.
The specific requirement for the encryption algorithm is that it must be a symmetric key block
cipher. Which of the following techniques will he use to fulfill this requirement?
Which of the following is the simulation of the disaster recovery plans?
Which of the following is the simulation of the disaster recovery plans?
Which project management plan will define who will be available to share information on the project risks?
You work as the project manager for Bluewell Inc. Your project has several risks that will affect
several stakeholder requirements. Which project management plan will define who will be
available to share information on the project risks?
Which of the following levels of RAID provides security features that are availability, enhanced performance,
Which of the following levels of RAID provides security features that are availability, enhanced
performance, and fault tolerance?
Which of the following backup sites takes the longest recovery time?
Which of the following backup sites takes the longest recovery time?
Which of the following is the correct order for searching data on a Windows based system?
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to
investigate the computer of an employee, who is suspected for classified data theft. Suspect’s
computer runs on Windows operating system. Peter wants to collect data and evidences for
further analysis. He knows that in Windows operating system, the data is searched in pre-defined
steps for proper and efficient analysis. Which of the following is the correct order for searching
data on a Windows based system?