Which of the following actions should be taken to ensure continual improvement of a Service Management System?
Which of the following actions should be taken to ensure continual improvement of a Service
Management System?
what pieces of information can be identified via this method?
During a one week investigation into the security of your network you work on identifying the
information that is leaked to the Internet, either directly or indirectly. One thing you decide to
evaluate is the information stored in the Whois lookup of your organizational website. Of the
following, what pieces of information can be identified via this method?
What document is produced to support this objective?
An objective of capacity management is to ensure that the service provider has, at all times,
sufficient capacity to meet the current and future agreed demands of the customer’s business
needs. What document is produced to support this objective?
Of the following Scenarios, select those that, just as described, represent potentially dangerous Social Engin
You are aware of the significance and security risk that Social Engineering plays on your
company. Of the following Scenarios, select those that, just as described, represent potentially
dangerous Social
Engineering:
What is the purpose of CobiT TM ?
What is the purpose of CobiT TM ?
What is this user most likely getting ready to do?
During the review of the security logs you notice some unusual traffic. It seems that a user has
connected to your Web site ten times in the last week, and each time has visited every single page
on the site. You are concerned this may be leading up to some sort of attack. What is this user
most likely getting ready to do?
which process?
Updates to the Service Level Agreement (SLA) shall be under the control of which process?
What type of cipher is used by an algorithm that encrypts data one bit at a time?
What type of cipher is used by an algorithm that encrypts data one bit at a time?
What characteristic do the ISO/IEC 27001 and ISO/IEC 20000 standards have in common?
What characteristic do the ISO/IEC 27001 and ISO/IEC 20000 standards have in common?
What is the function of Secedit.exe?
You have just become the senior security professional in your office. After you have taken a
complete inventory of the network and resources, you begin to work on planning for a successful
security implementation in the network. You are aware of the many tools provided for securing
Windows 2003 machines in your network. What is the function of Secedit.exe?