What is used to provide security mechanisms for the storage, processing, and transfer of data
Fill in the blank with an appropriate phrase.______________ is used to provide security mechanisms
for the storage, processing, and transfer of data.
what will be your answer for her question?
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited
personnel in the field of security management.
She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to
provide an organized way to make decisions if a disruptive event occurs and asks for the other
objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what
will be your answer for her question?
Each correct answer represents a part of the solution. Choose three.
Which of the following types of ciphers are included in the historical ciphers?
Which
of the following types of ciphers are included in the historical ciphers? Each correct answer
represents a complete solution. Choose two.
System meets all control requirements.
Software Development Life Cycle (SDLC) is a logical process used by programmers to develop
software. Which of the following SDLC phases meets the audit objectives defined below:
System and data are validated.
System meets all user requirements.
System meets all control requirements.
Which of the following security protocols provides confidentiality, integrity, and authentication of network t
Which
of the following security protocols provides confidentiality, integrity, and authentication of network
traffic with end-to-end and intermediate-hop security?
which of the following disaster recovery testing plans is the most cost-effective…?
John
works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery
management plan. One of his team members has a doubt related to the most cost effective DRP
testing plan. According to you, which of the following disaster recovery testing plans is the most
cost-effective and efficient way to identify areas of overlap in the plan before conducting more
demanding training
exercises?
which one?
You are the project manager of the NGQQ Project for your company. To help you communicate
project status to your stakeholders, you are going to create a stakeholder register. All of the
following information should be included in the stakeholder register except for which one?
which one?
You are the project manager of the NGQQ Project for your company. To help you communicate
project status to your stakeholders, you are going to create a stakeholder register. All of the
following information should be included in the stakeholder register except for which one?
What information does the AV (Asset Value) convey?
You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF *
ARO What information does the AV (Asset Value) convey?
Which of the following are examples of physical controls used to prevent unauthorized access to sensitive mate
Which of the following are examples of physical controls used to prevent unauthorized access to
sensitive materials?