True or false?
Digital signatures require the sender to “sign” the data by encrypting the data with the sender’s
public key, to then be decrypted by the recipient using the recipient’s private key. True or false?
Where can a project manager find risk-rating rules?
Where can a project manager find risk-rating rules?
Which of the following risks would BEST be assessed using quantitative risk assessment techniques?
Which of the following risks would BEST be assessed using quantitative risk assessment
techniques?
What you should do in order to fulfill that?
You are the project manager of GHT project. You have implemented an automated tool to analyze
and report on access control logs based on severity. This tool generates excessively large
amounts of results. You perform a risk assessment and decide to configure the monitoring tool to
report only when the alerts are marked “critical”. What you should do in order to fulfill that?
Which of the following provides the BEST single-factor authentication?
Which of the following provides the BEST single-factor authentication?
Which of the following SDLC phases meets the audit objectives defined below?
Software Development Life Cycle (SDLC) is a logical process used by programmers to develop
software. Which of the following SDLC phases meets the audit objectives defined below?
• System and data are validated.
• System meets all user requirements.
• System meets all control requirements.
The impact of losing frame relay network connectivity for 18-24 hours should be calculated using the:
The impact of losing frame relay network connectivity for 18-24 hours should be calculated using
the:
What risk response is likely to be used?
One of the risk events you’ve identified is classified as force majeure. What risk response is likely
to be used?
What is used to provide authentication of the website and can also be used to successfully authenticate keys u
What is used to provide authentication of the website and can also be used to successfully
authenticate keys used for data encryption?
What risk response has been used here?
Ben is the project manager of the CMH Project for his organization. He has identified a risk that
has a low probability of happening, but the impact of the risk event could save the project and the
organization with a significant amount of capital. Ben assigns Laura to the risk event and instructs
her to research the time, cost, and method to improve the probability of the positive risk event. Ben
then communicates the risk event and response to management. What risk response has been
used here?