Which of the following risk management techniques is your company using?
Your company is covered under a liability insurance policy, which provides various liability coverage
for information security risks, including any physical damage of assets, hacking attacks, etc. Which of
the following risk management techniques is your company using?
Which of the following phases of the Incident handling process should you follow next to handle this incident?
You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process
to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked
to your internal enterprise network. Which of the following phases of the Incident handling process
should you follow next to handle this incident?
What will be your answer?
You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign
for your employees. One of the employees of your organization asks you the purpose of the security
awareness, training and education program. What will be your answer?
Which of the following locations must have a camera in order to provide the minimum level of security for the
You have decided to implement video surveillance in your company in order to enhance network
security. Which of the following locations must have a camera in order to provide the minimum level
of security for the network resources? Each correct answer represents a complete solution. Choose
two.
What is this called?
You are responsible for network and information security at a metropolitan police station. The most
important concern is that unauthorized parties are not able to access data. What is this called?
What is this called?
You are responsible for network and information security at a metropolitan police station. The most
important concern is that unauthorized parties are not able to access data. What is this called?
What will you implement to accomplish this?
You work as a Network Administrator for NetTech Inc. You want to have secure communication on
the company’s intranet. You decide to use public key and private key pairs. What will you implement
to accomplish this?
What component of the change management system is responsible for evaluating, testing, and documenting changes
What component of the change management system is responsible for evaluating, testing, and
documenting changes created to the project scope?
What component of the change management system is responsible for evaluating, testing, and documenting changes
What component of the change management system is responsible for evaluating, testing, and
documenting changes created to the project scope?
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashi
Which of the following protocols is used to compare two values calculated using the Message Digest
(MD5) hashing function?